USEP-IC
Would you like to react to this message? Create an account in a few clicks or log in to continue.


 
HomeHome  PortalPortal  Latest imagesLatest images  SearchSearch  RegisterRegister  Log inLog in  

 

 Assignment 4 (Due: December 17, 2009, before 01:00pm)

Go down 
+60
IK
kristine_delatorre
Fritzielaine A. Barcena
jojimie
Gleizelle Jen Dieparine
Chris Romarate
Ma.AnnKristineTomada
basith_jumat
carla comoda
Michelle Adlawan
Roy Cuevas
emilio jopia jr.
Sheila Capacillo
alma cabase
florenzie_palma
Jovylin O. Sandoval
kate karen rasonable
jerald jean pullos
Karen Palero
creza_jill_bulacito
charmaine_dayanan
Joan Rose P. Dandoy
athina alorro
Norena T. Nicdao
felix a. sumalinog jr.
Gabrielle Anne Rae Deseo
mae m. mara
Jezreel Jyl P. Hilado
katherine eng lajom
Marren Pequiro
Dolorosa G. Mancera
shane sacramento
leah_saavedra
Sarah Jean Tisara
ailaine adaptar
Ariel Serenado
joverly gonzales
Maria Theresa F. Rulete
Joseph Ethel Valdez
neil rey c. niere
Michael George Guanzon
rosemie nunez
karl philip abregana
Tanya Clarissa G. Amancio
Jethro Alburo Querubin
Shiela Marie P. Nara
Alfredo V. Ala-an
Stihl Lhyn Samonte
janraysuriba
John Paul Pulido
brian c. namuag
sharlyn joy pines
AlyssaRae Soriano
fatima paclibar
vanessa may caneda
Franz Cie B. Suico
♥ilyn_mapalo♥
Anthony Rigor Aguilar
aeros salaga
eyesee
64 posters
Go to page : Previous  1, 2, 3, 4
AuthorMessage
Edsa Fe Esio

Edsa Fe Esio


Posts : 30
Points : 30
Join date : 2009-06-23

Assignment 4 (Due: December 17, 2009, before 01:00pm) - Page 4 Empty
PostSubject: Assignment # 4:   Assignment 4 (Due: December 17, 2009, before 01:00pm) - Page 4 EmptyTue Jun 29, 2010 11:04 pm

You were invited by the university president to prepare an IS Plan for the university. Discuss what are the steps in order to expedite the implementation of the IS plan.

To be invited in a university to prepare an ISP is great opportunity and at the same time needs a thorough analysis to address the problem and to be fit in the institutions concerns. Preparing an Information Systems Plan for the university is a very challenging task because a lot of things are to be considered when we talk of Information System Planning. Planning for information systems, as for any other system, begins with the identification of needs. In order to be effective, development of any type of computer-based system should be a response to need--whether at the transaction processing level or at the more complex information and support systems levels. Such planning for information systems is much like strategic planning in management. Objectives, priorities, and authorization for information systems projects need to be formalized. The systems development plan should identify specific projects slated for the future, priorities for each project and for resources, general procedures, and constraints for each application area. The plan must be specific enough to enable understanding of each application and to know where it stands in the order of development. Also the plan should be flexible so that priorities can be adjusted if necessary. It has emphasized the need for continuously updating and improving the strategic capabilities architecture.
It has been discussed in various studies by most experts in the past years until now that strategic planning for the business operations of an organization is a very crucial part in targeting towards the success of the company. An information system contains so much of the essential data and gathered facts about the company that it is considered as a critical unit inside the company. That is why planning which is prepared primarily for the business operations and processes alone as most people perceive it to be, also has to be tactically deliberated for the information system (IS).

Some characteristics of strategic IS planning are:
• Main task: strategic/competitive advantage, linkage to business strategy.
• Key objective: pursuing opportunities, integrating IS and business strategies
• Direction from: executives/senior management and users, coalition of users/management and information systems.
• Main approach: entrepreneurial (user innovation), multiple (bottom-up development, top down analysis, etc.) at the same time.

Information System Plan
An Information System Plan or ISP, on the other hand, is basically a plan concentrated on aligning the information systems of an organization to its business plan as a whole. An information system is comprised of the hardware, software and peopleware of an organization. Usually, the term information system is related to using technology as a crucial part of an organization. The term is also used to identify the computer-based system that an organization is using.
The information systems plan project determines the sequence for implementing specific information systems. The goal of the strategy is to deliver the most valuable business information at the earliest time possible in the most cost-effective manner. The end product of the information systems project is an information systems plan (ISP). Once deployed, the information systems department can implement the plan with confidence that they are doing the correct information systems project at the right time and in the right sequence. The focus of the ISP is not one information system but the entire suite of information systems for the enterprise. Once developed, each identified information system is seen in context with all other information systems within the enterprise.
The information systems planning refers to the process of the translation of strategic and organizational goals into systems development plan and initiativesFor example, part of the information systems plan for a luxury car company might be to build a new product tracking system to meet the organizational goal of improving customer service. Proper information systems planning ensures that specific systems development objectives support organizational goals. One of the primary benefits of information systems planning is that it provides a long-range view of information technology use in the organization. The information systems plan provides guidance on how the information systems infrastructure of the organization should be developed over time. The plan serves as a road map indicating the direction and rationale of systems development. Another benefit of information systems planning is that it ensures better use of information systems resources, including funds, information systems personnel, and time for scheduling specific projects. Overall objectives of information systems are usually distilled from the relevant aspects of the organization's business strategic plan. Information systems projects can be identified either directly from the objectives determined in the first step or may be identified by others, such as managers within the various functional areas. Setting priorities and selecting projects typically requires the involvement and approval of senior management. Once specific projects have been selected within the overall context of a strategic plan for the business and the systems area, an information systems plan can be developed. The plan contains a statement of organizational goals, identifies the project objectives, and specifies how information technology supports the attainment of the organizational goals. When objectives are set, planners consider the resources necessary to complete the projects including equipment (computers, network servers, printers, and other equipment and devices), software, employees (systems analysts, programmers, users and others), expert advice (specialists and other consultants), and so on. The information systems plan lays out specific target dates and milestones that can be used later to monitor the plan’s progress in terms of how many objectives were actually attained in the time frame specified in the plan. The plan also includes the key management decisions concerning hardware acquisition; structure of authority, data, and hardware; telecommunications; and required organizational change. Organizational changes are usually described, including management and employee training requirements; recruiting efforts; changes in business processes; and changes in authority, structure, or management practice. As part of translating the corporate strategic plan into the information systems plan, many companies seek systems development project that will provide a competitive advantage. This usually requires creative and critical analysis. Creative analysis involves the investigation of new approaches to existing problems. By looking at problems in new or different ways and by introducing innovative methods to solve them, many firms have gained a competitive advantage. Typically, these new solutions are inspired by people and things not directly related to the problem. Critical analysis requires unbiased and careful questioning of whether system elements are related in the most effective or efficient ways. It involves considering the establishment of new or different relationships among system elements and perhaps introducing new elements into the system. The impact a particular system has on an organization's ability to meet its goals determines the true value of that system to the organization. While all systems should support business goals, some systems are more pivotal in continued operations and goal attainment than others. These systems are called mission-critical systems. An order processing TPS, for example, is usually considered mission-critical. Without it, few organizations could continue daily activities, and they clearly would not meet the goals. The goals defined for an organization will in turn define the objectives set for a system. A manufacturing plant, for example, might determine that minimizing the total cost of owning and operating its equipment is a critical success factor (CSF) in meeting a production volume and profit goals. This CSF would be converted into specific objectives for a proposed plant equipment maintenance system. One specific objective might be to alert maintenance planner when a piece of equipment is due for routine preventive maintenance (e.g., cleaning and lubrication). Another objective might be to alert the maintenance planners when the necessary cleaning materials, lubrication oils, or spare parts inventory levels are below specified limits. These objectives could be accomplished either through automatic stock replenishment via electronic data interchange or through the use of exception reports. Regardless of the particular system development effort, the development process should define a system with specific performance and cost objectives. The success or failure of the systems development effort will be measured against these objectives. Performance objectives measure the extent to which a system performs as desired. Is the system generating the right information for a value-added business process? Is the output generated in a form that is usable and easily understood? Is the system generating output in time to meet organizational goals and operational objectives? Cost objectives attempt to balance the benefits of achieving performance goals with all costs associated with the system. Balancing performance and cost objectives within the overall framework of organizational goals can be challenging. Systems development objectives are important, however, in that they allow an organization to effectively and efficiently allocate resources and measure the success of a systems development effort. In order to develop an effective information systems plan, the organization must have a clear understanding of both its long- and short-term information requirements. Two principal methodologies for establishing the essential information requirements of the organization as a whole are enterprise analysis and critical success factors. Enterprise analysis argues that the firm's information requirements can only be understood by looking at the entire organization in terms of organizational units, functions, processes, and data elements. Enterprise analysis can help identify the key entities and attributes of the organization's data. The central method used in the enterprise analysis approach is to take a large sample of managers and ask them how they use information, where they get the information, what their environments are like, what their objectives are, how they make decisions, and what their data needs are. The results of this large survey of managers are aggregated into subunits, functions, processes, and data matrices. Data elements are organized into logical application groups--groups of data elements that support related sets of organizational processes. The weakness of enterprise analysis is that it produces an enormous amount of data that is expensive to collect and difficult to analyze. Most of the interviews are conducted with senior or middle managers, but there is little effort to collect information from clerical workers and supervisory managers. Moreover, the questions frequently focus not on management's critical objectives and where information is needed but rather on what existing information is used. The result is a tendency to automate whatever exists. But in many instances, entirely new approaches to how business is conducted are needed, and these needs are not addressed. The strategic analysis or critical success factors approach argues that an organization's information requirements are determined by a small number of critical success factors (CSFs) of managers. If these goals can be attained, the firm's or organization's success is assured. CSFs are shaped by the industry, the firm, then manager, and the broader environment. An important premise of the strategic analysis approach is that there are a small number of objectives that managers can easily identify and on which information systems can focus. The strength of the CSF method is that it produces a smaller data set to analyze than does enterprise analysis. The CSF method takes into account the changing environment with which organizations and managers must deal. This method explicitly asks managers to look at the environment and consider how their analysis of it shapes their information needs. Unlike enterprise analysis, the CSF method focuses organizational attention on how information should be handled. The method's primary weakness is that the aggregation process and the analysis of the data are art forms. There is no particularly rigorous way in which individual CSFs can be aggregated into a clear company pattern. Second, there is often confusion among interviewees (and interviewers) between individual and organizational CSFs. They are not necessarily the same. What can be critical to a manager may not be important for the organization. Moreover, this method is clearly biased toward top managers because they are generally the only ones interviewed.

WHAT IS SISP METHODOLOGY?
Methodology is generally a guideline for solving a problem, with specific components such as phases, tasks, methods, techniques and tools. Methodology benefits managers by providing information to plan, review and control projects. Generally methodologies are
comprised of the following four elements: providing an opinion of what needs to be solved, defining techniques on what has to be done and when to do it, advising on how to manage the quality of deliverables or products, as well as providing a toolkit to facilitate the process.
An SISP methodology can be viewed as an abstract system design that functions to transform organizational inputs (such as business strategy, assessment of current IS environment, and organizational influence) into an IS Strategic Plan as an output. When executing the SISP process, the abstract system design is applied in the context of multiple human activity systems
(HAS) involving the SISP stakeholders (developers and clients). SISP methodologies can be categorized into two categories; namely, general and specific-tocontext methodologies. Three contexts were analyzed in the latter category; namely, business
context, government context and educational context. While there are numerous SISP methodologies, approaches and frameworks, the majority is oriented for commercial and production-based organizations, and is not suitable to guide SISP formulation in service-oriented
industries and government. The business strategy model and a university strategy model are different in terms of time frame, consensus, value system, customers and context. Thus, business-context SISP methodologies are not suitable to guide SISP formulation in public
educational institutions and government agencies because they focus primarily on the alignment of ICT strategies to the business objective of profits and competition. Government agencies and PIHLs focus on the formulation of ICT strategies to improve service delivery to the citizen and nation rather than profitability and competition. Although many SISP methodologies provide an overview of how to develop an SISP, the methods, techniques and tools to guide the SISP formulation process are not specified. The SISP initiation approach, the SISP team, and the set of tasks, activities and tools are not suited to the educational institution environment. Thus, the primary objective of the ISP-IPTA Methodology design was to document objectives and tasks in every phase, as well as the methods and techniques that can be used to implement the tasks. The methods and techniques are complimented by an automated toolkit that that can facilitate the SISP formulation process. Information systems are important tools for effectively meeting organizational objectives. Readily available, complete, and accurate information is essential for making informed and timely decisions. Being unable to obtain needed data, wading through unneeded data, or inefficiently processing needed data wastes resources. The organization must identify its information needs on the basis of a systematic identification and analysis of its mission and functions to be performed, who is to perform them, the information and supporting data needed to perform the functions, and the processes needed to most usefully structure the information. Successful information system development and acquisition must include a rigorous and disciplined process of data gathering, evaluation, and analysis prior to committing significant financial and human resources to any information system development. While implementing such an approach may not preclude all information system acquisition problems, it should produce detailed knowledge of organizational missions and operations, user information needs and alternatives to address those needs, and an open and flexible architecture that is expandable or that can be upgraded to meet future needs. The purpose and use of information system in the beginning was targeted towards reducing manual labor and increasing efficiency and thus reducing cost of doing business. Cost has thus been the ‘primal instinct’ justification for the usage of Information system in companies. Management seems to still use this justification even in today’s day and age because the IT salesman still thinks it’s the best and only way to get management buy-in. Moreover, as most other rationales used for IS have proved hard to sell, both the IT sales teams and their customers find a comfort zone in cost savings. This could also be because both sides (from all their previous experiences) are convinced of their failure before they even start out on a different track. The past experiences, in most cases were times they tried, half heartedly probably, without enough experience and failed. These failures have resulted in the baby being thrown out along with the dirty water. Systems are usually laid out at different levels. The lowest rung in the ladder is taken by the TRANSACTIONAL information system. These are ones like ‘Pont Of Sales’ systems used in the store counters, or book keeping systems mentioned earlier. These are systems targeting cost reduction, capturing repetitive activities and assisting the human using it to become more efficient in handling larger volumes of transactions.
The OPERATIONAL or operation support systems are usually build combining several Transactional systems in a logical sequence so as to make the operation of any particular division/functional group more efficient. Classic example is the integration of Accounting, Payroll, HR, and Inventory, Production etc. to form a MRP or ERP system. Or POS, Customer Account Info, Accounting, etc. linked together to form a CRM system. A very critical component for operational systems is their reporting systems. They provide the reports that combine and merge the reports/information from several transactional systems to provide reports to help executives manage operations in a synchronized and optimized manner. Thus, they act as enablers and help managers to keep track of various parameters so as to keep the whole operation smooth and efficient. STRATEGIC systems are little more complicated. They cross the regular operational boundaries and become tools that form the basis for senior management to plan, execute and monitor the organization. They help in keeping track of the Key Performance Indicators by combining and logically sorting information from various Operational and Transactional systems all across the company and at times combining it with external information from sources like the stock market, industry sources, partners and even competitors. Designing STRATEGIC information system requires a thought process of a ‘good’ CEO with an understanding of the business from the top, various information sources present in the company and outside in platforms that need to be collated, combined and extracted into a tool to help run the company in a more informed and responsive manner.

Characteristics of a Quality ISP
A quality ISP must exhibit five distinct characteristics before it is useful. These five are
as follows.
Timely. The ISP must be timely. An ISP that is created long after it is needed is
useless. In almost all cases, it makes no sense to take longer to plan work than to perform the work planned.
Useable. The ISP must be useable. It must be so for all the projects as well as for each project. The ISP should exist in sections that once adopted can be parceled out to project managers and immediately started.
Maintainable. The ISP should be maintainable. New business opportunities, new computers, business mergers, etc. all affect the ISP. The ISP must support quick changes to the estimates; technologies employed, and possibly even to the fundamental project sequences. Once these changes are accomplished, the new ISP should be just a few computer program executions away.
Quality. While the ISP must be a quality product, no ISP is ever perfect on the first
try. As the ISP is executed, the metrics employed to derive the individual project estimates become refined as a consequence of new hardware technologies, code generators, techniques, or faster working staff. As these changes occur, their effects should be installable into the data that supports ISP computation. In short, the ISP is a living document. It should be updated with every technology event, and certainly no less often than quarterly.
Reproducible. The ISP must be reproducible. That is, when its development activities are performed by any other staff, the ISP produced should essentially be the same. The ISP should not significantly vary by staff assigned.
Whenever a proposal for the development of an ISP is created it must be assessed against these five characteristics. If any fail or not addressed in an optimum way, the entire set of funds for the development of an ISP is risked.

There are a number of important steps that have been identified which can maximize the chances of a smooth transition and implementation.
1. PROBLEM RECOGNITION
Senior management must recognize that resistance to change is a potential problem. There needs to be an acceptance that some time, budget and internal resources should to be allocated to deal with this.
2. CLEAR OBJECTIVES
Senior management must have a clearly defined statement of objectives for the system, detailing the expected benefits. Without this it will be impossible to determine whether the implementation is a success from a business perspective.
3. IMPLEMENTATION MANAGER
An internal manager should be appointed to co-ordinate the implementation. This person should be given the necessary skills and authority to guide users through the new procedures and promote their adoption of the project portfolio management system.
4. REVIEW PROCEDURES
Existing procedures must be understood by all system users and clearly documented. Any proposed changes to these procedures should be highlighted and the benefits detailed and communicated to all system users.
5. INVOLVE ‘EXPERTS’
Highly respected and influential individuals must be involved in the planning process and should be consulted early on in the process so that any valid points they may have can be factored into the final solution.
6. COMMUNICATION
All staff and contractors whose work is affected by the new system should be briefed about the objectives of the system, the expected outcomes and the timeline for implementation. It should be made clear at this stage that old systems WILL be removed at a specific time in the future, thereby encouraging everyone to be involved.
7. TRAINING
All staff and contractors involved in using the new project portfolio management system should be provided with appropriate training within the context of their roles. This training should also include any new procedures that are to be adopted. Training should not be a one-off event. Staff turnover and new project contractors often results in new users attempting to figure out how a system works and learn on the job. Inevitably some expertise is lost with a change of staff and over time this can degrade the performance of the team. In the long run it is simpler and more cost-effective to have new starters and contractors properly trained, possibly combining this with a refresher course for existing staff.
8. IMPLEMENTATION REVIEW TEAM
An internal Implementation Review Team should be established comprising key personnel who will be involved with the new system e.g. project managers and resource/line managers. Weekly meetings, chaired by the Implementation Manager, should be held during the implementation process to highlight any perceived problems and discuss resolutions.
9. OLD SYSTEM SHUT-DOWN
At a pre-designed date, that has been communicated to all staff and contractors, the old system should be shut down and removed from company hardware, after giving reminders in the run up to the date.
10. VENDOR CLINICS
Building on the work done by the Implementation Review Team, a good system vendor will offer clinics to review and resolve teething issues and provide additional training if necessary.

The major steps associated with implementation. Note that many of these activities need to be completed ahead of time. You cannot start planning for implementation while you are actually implementing.
1.Prepare the infrastructure. Many solutions are implemented into a production environment that is separate and distinct from where the solution was developed and tested. It is important that the characteristics of the production environment be accounted for. This strategy includes a review of hardware, software, communications, etc. In our example above, the potential desktop capacity problem would have been revealed if we had done an evaluation of the production (or real-world) environment. When you are ready for implementation, the production infrastructure needs to be in place.
2.Coordinate with the organizations involved in implementation. This may be as simple as communicating to your client community. However, few solutions today can be implemented without involving a number of organizations. For IT solutions, there are usually one or more operations and infrastructure groups that need to be communicated to ahead of time. Many of these groups might actually have a role in getting the solution successfully deployed. Part of the implementation work is to coordinate the work of any other groups that have a role to play. In some cases, developers simply failed to plan ahead and make sure the infrastructure groups were prepared to support the implementation. As a result, the infrastructure groups were forced to drop everything to make the implementation a success.
3.Implement training. Many solutions require users to attend training or more informal coaching sessions. This type of training could be completed in advance, but the further out the training is held, the less information will be retained when implementation rolls around. Training that takes place close to the time of implementation should be made part of the actual implementation plan.
4.Install the production solution. This is the piece everyone remembers. Your solution needs to be moved from development to test. If the solution is brand new, this might be finished in a leisurely and thoughtful manner over a period of time. If this project involves a major change to a current solution, you may have a lot less flexibility in terms of when the new solution moves to production, since the solution might need to be brought down for a period of time. You have to make sure all of your production components are implemented successfully, including new hardware, databases, and program code.
5.Convert the data. Data conversion, changing data from one format to another, needs to take place once the infrastructure and the solution are implemented.
6.Perform final verification in production. You should have prepared to test the production solution to ensure everything is working as you expect. This may involve a combination of development and client personnel. The first check is just to make sure everything is up and appears okay. The second check is to actually push data around in the solution, to make sure that the solution is operating as it should. Depending on the type of solution being implemented, this verification step could be extensive.
7.Implement new processes and procedures. Many IT solutions require changes to be made to business processes as well. These changes should be implemented at the same time that the actual solution is deployed.
8.Monitor the solution. Usually the project team will spend some period of time monitoring the implemented solution. If there are problems that come up immediately after implementation, the project team should address and fix them.

Part I of this series pointed out the need for planning and communication to help ensure a successful implementation. In this column, we looked at the actual work typically performed in a complex implementation. However, your implementation may not be as complex, and you may not need to look at all of these areas. Nevertheless, there is usually a lot more involved than just throwing the final solution into the production environment. You need to account for the environment the solution will run in, as well as processes and training needs of the client community. If you think through implementation from a holistic approach and communicate well, there is a much greater likelihood that your project will end as a win.

Here are some steps on how to implement an Information System:
Preparation. Before you begin to implement the procedures described in this guide, you already should have prepared your institution for the analysis.1 As a result of your preparation, you should have clearly defined your goals and objectives for the new IS.
Goals. Goal-setting ideally involves establishing specific, measurable, attainable, realistic and time-targeted objectives. Work on the theory of goal-setting suggests that it can serve as an effective tool for making progress by ensuring that participants have a clear awareness of what they must do to achieve or help achieve an objective. On a personal level, the process of setting goals allows people to specify and then work towards their own objectives — most commonly financial or career-based goals. Goal-setting comprises a major component of Personal development.
Personal goals. Individuals can set personal goals. A student may set a goal of a high mark in an exam. An athlete might walk five miles a day. A traveler might try to reach a destination-city within three hours. Financial goals are a common example, to save for retirement or to save for a purchase. Managing goals can give returns in all areas of personal life. Knowing precisely what one wants to achieve makes clear what to concentrate and improve on, and often subconsciously prioritizes that goal. Goal setting and planning ("goalwork") promotes long-term vision and short-term motivation. It focuses intention, desire, acquisition of knowledge, and helps to organize resources. Efficient goalwork includes recognizing and resolving any guilt, inner conflict or limiting belief that might cause one to sabotage one's efforts. By setting clearly-defined goals, one can subsequently measure and take pride in the achievement of those goals. One can see progress in what might have seemed a long, perhaps impossible, grind.

Goal management in organizations
Organizationally, goal management consists of the process of recognizing or inferring goals of individual team-members, abandoning no longer relevant goals, identifying and resolving conflicts among goals, and prioritizing goals consistently for optimal team-collaboration and effective operations. For any successful commercial system, it means deriving profits by making the best quality of goods or the best quality of services available to the end-user (customer) at the best possible cost. Goal management includes:
• Assessment and dissolution of non-rational blocks to success
• Time management
• Frequent reconsideration (consistency checks)
• Feasibility checks
• Adjusting milestones and main-goal targets

Morten Lind and J.Rasmussen distinguish three fundamental categories of goals related to technological system management:
1. Production goal
2. Safety goal
3. Economy goal
An organizational goal-management solution ensures that individual employee goals and objectives align with the vision and strategic goals of the entire organization. Goal-management provides organizations with a mechanism to effectively communicate corporate goals and strategic objectives to each person across the entire organization. The key consists of having it all emanate from a pivotal source and providing each person with a clear, consistent organizational-goal message. With goal-management, every employee understands how their efforts contribute to an enterprise's success. Having a strategic plan for an organization is a big help and very efficient in developing and implementing a project. There are steps to follow, things to remember and consider, discuss and analyze, evaluate and studied thoroughly. Implementing the proposed Information Systems Plan is a tough thing to do in Information Systems Planning. All the hard works starting from the identification of needs, then formalizing the objectives, priorities, and authorization for the information systems project, and all the necessary things needed to be done in planning information systems will not be appreciated if the said information systems plan will not be properly implemented or worst, will never be implemented because of some user resistance. Thus, in an information systems planning, steps for implementing the proposed information systems plan should be included. A well planned information system is no doubt can help an organization with, of course, the aid of the officials and staff. Proper implementation in the long run and with full grasp of everyone to hold on the new technology and embrace the changes for the betterment and improvement of the institution in terms of processes and business flow.









Back to top Go down
Venus Millena

Venus Millena


Posts : 41
Points : 41
Join date : 2009-06-23
Age : 34
Location : lacson ext., brgy. obrero, davao city

Assignment 4 (Due: December 17, 2009, before 01:00pm) - Page 4 Empty
PostSubject: Re: Assignment 4 (Due: December 17, 2009, before 01:00pm)   Assignment 4 (Due: December 17, 2009, before 01:00pm) - Page 4 EmptyThu Jul 08, 2010 10:35 am

You were invited by the university president to prepare an IS plan for the university, discuss what are the steps in order to expedite the implementation of the IS Plan. (at least 5000 words)

Inviting by the university president to prepare an IS plan for the university and discussing the steps in order to expedite the implementation of the IS plan to the president is a great honor. I would suggest to him that we can use a scientific methodology that surely help for the implementation and successful of a project. Before doing so, let first discuss about IS plan.
Strategic information systems planning (SISP) is the process of identifying a portfolio of computer-based applications that will assist an organization in executing its business plans and realizing its business. Because information technology is playing an increasingly strategic role in today's highly competitive business world, the need for effective strategic information systems planning (SISP) has become more and more critical. SISP can contribute substantially to an organization. It can bring IS users and IS professionals together and establish a mutual understanding of the value of information systems and the problems associated with them. It also can help the organization develop priorities for information systems development by ranking such systems in terms of their efficiency, effectiveness, and strategic value. In that manner, it helps the organization identify its portfolio of planned computer-based applications, which both align well with corporate strategy and can create an advantage over competitors. Although much SISP research has been conducted over the past few years, the same types of problems repeatedly appear, thus suggesting that SISP has not improved much in practice. A gap continues to separate the plans and expectations of the developers of an IS strategy from the actual outcome of the strategy. Often, only a few of the systems in the strategy are implemented and some of them take substantially longer than anticipated. A survey of four Norwegian organizations found that only 42% of the projects in the formal IT strategy had been implemented after five years. This lack of implementation not only leaves firms dissatisfied with their current SISP, but also creates problems establishing and maintaining priorities in future SISP.

When we talk about IS plan, we all know that it is Information System Planning. And IS plan is a process for developing a strategy and plans for aligning information systems with the business strategies of an organization. It is the step-by-step plan to be able to meet the needs of an organization and to reach its goal and objectives. Many enterprises do not have model-based information systems development environments that allow system designers to see the benefits of rearranging an information systems development schedule.
The following is the steps we can use by simply following this outline to start up making a formal Information System Plan:

• Introduction-a story-telling on something about the project and other existing system.
• Vision-stating what the system would be and how the operation is surely the key to success.
• Mission- Create the mission mode - The mission model, generally shorter than 30 pages presents end-result characterizations of the essential reason of the enterprise.
•Objectives -is a projected state of affairs that a person or a system plans or intends to achieve—a personal or organizational desired end-point in some sort of assumed development. Many people endeavor to reach goals within a finite time by setting deadlines.
A desire or an intention becomes a goal if and only if one activates an action for achieving it (see goal-oriented). It is roughly similar to purpose or aim, the anticipated result which guides action, or an end, which is an object, either a physical object or an abstract object, that has intrinsic value.

• Goals- setting ideally involves establishing specific, measurable, attainable, realistic and time-targeted objectives. Work on the theory of goal-setting suggests that it can serve as an effective tool for making progress by ensuring that participants have a clear awareness of what they must do to achieve or help achieve an objective. On a personal level, the process of setting goals allows people to specify and then work towards their own objectives — most commonly financial or career-based goals. Goal-setting comprises a major component of Personal development.

The second part is composed of the ff:

• Competitive Advantage of the University
• Current development Trends
• Challenges and Priorities

The third part is composed of the ff:

• Academic Programs, Curriculum and Instruction
• Research, Development, and Extension
• Administration and Institution
• Physical Plant and Facilities
• Human Resource Development
• Financial Resources
• Student Services
• Library Services

The fourth part is composed of the ff:

• Implementing Mechanisms
• Communicating Mechanisms

The fifth part is composed of the ff:

• Scope and Focus
• Strategies
• M & E Deliverables
To discuss further, I’ll present to you the more comprehensive and well explained details about the steps in order to expedite the implementation of IS Plan.

Step 1.Getting Started
The first step in a consumer information project is to lay the foundation for the project—financially, politically, and organizationally. While this may sound obvious, many projects fail because sponsors do not take the time to prepare. They dive right into the process of collecting and reporting data, only to be taken by surprise when someone objects to the project or the money runs out.

On the other hand, some projects never even get off the ground because the sponsors can't move beyond the planning process. The key to moving beyond the organizational stage is to develop and stick to a schedule that will force decisions and push the participants forward in the process.

Step 2.Collecting and Analyzing Data

During the planning stage (Step 1), sponsors choose what types of quality measures to share with the audience.

For guidance, go to Choose Quality Measures.
For many sponsors, the next step in a consumer information project is to gather that data and conduct the appropriate analyses so that these measures have meaning for consumers.
For more information on this step, choose one of the following topics:
• Where You Can Get Information on Quality.
• How to Know When You'll Need Help.
• How to Skip This Step.
• Making Sure Information Is Credible.

Where You Can Get Information on Quality

The source of quality information depends on the kind of data you need, which depends on the nature of the project you undertake. For some projects, particularly those involving health plans, standardized information is readily available, with little need for additional analysis. For projects involving provider groups, on the other hand, it may be necessary to collect and process raw data that can be turned into useful information.

How to Know When You'll Need Help
You are not likely to need help if the information you want is available from a reliable, trustworthy source that has already processed the data. In that case, you need only request or purchase the data and prepare it to meet the needs of your audience. For instance, several State agencies use the HEDIS® results (including averages and benchmarks)
provided by the NCQA's Quality Compass database to create a quality report on all the plans in the State.


Analysis Needed? Consider Some Assistance
If the data exist but require additional analysis to be useful to your audience, you may need assistance from a vendor qualified to conduct the type of analysis you need. For example, a purchasing coalition that offers five health plans to its members' employees could use HEDIS® results to calculate benchmarks or averages for those plans only. While some sponsors can handle an analysis of quality data on their own, others would benefit from expert advice and technical know-how.

Doing Your Own Data Collection and Analysis? Hire Help
If you want to collect and analyze quality data yourself, you would be well-advised to contract with a knowledgeable, experienced vendor. Few sponsors have the technical know-how, the manpower, or the clinical knowledge to generate their own data and do their own analyses. If, for instance, you want to use the CAHPS® survey kit to gather data on your employees' experiences with care, you have to rely on an outside contractor.
The CAHPS® protocol recommends that the survey be conducted by an independent vendor that will take responsibility for collecting the data, analyzing it, and presenting the results in a manner consistent with the CAHPS® methodology.
Sponsors may also need outside help when they combine measures into categories, calculate summary scores, or show relative performance; consultants with statistical expertise can ensure that the sponsors don't misrepresent the performance of competing plans.


How to Skip this Step
Of course, not all sponsors want to or can gather quality information on their own. While you may start out with the intention of doing everything yourself, it is not always practical or affordable to obtain the data you need when you need it. It may also be redundant and thus wasteful to ask health care organizations for information they have already given to someone else.
Rather than follow this path, you may prefer to use information that another party has already prepared, or direct consumers to data provided by others. In many markets, organizations such as regulatory agencies, purchasers, accrediting organizations, and provider associations are collecting health care quality data on a regular basis. Examples of useful sources of quality information include Medicare, the U.S. Office of Personnel Management, and possibly agencies in your own State government.
This approach is efficient and offers sponsors the ability to present more data than they could have ever gathered on their own. The potential downside, however, is that you will probably need to make some compromises. That is, the information made available by someone else may not be exactly what you want, ready when you want it, or applicable to the precise information needs of your audience.

Making Sure Information Is Credible
From your perspective as a sponsor hoping to educate and inform the public, the validity and accuracy of data are critical. If consumers do not trust that the data truly reflect the quality of care they can expect, all your efforts are wasted.
To ensure the credibility of your data, make sure you understand the methodology that was used to collect and analyze it. Some tools, such as the CAHPS® Survey and Reporting Kit, include specific instructions for sponsors regarding what they need to understand to maintain the validity of data. You do not need to understand all of the technical and statistical details, but you should feel confident about the following:

• The information has been collected and reported in compliance with an established, tested methodology. If the task is being handled by an outside vendor, confirm that the vendor is following an accepted protocol (e.g., using an appropriate sample size).
• The analysis and interpretation of the data has been handled independently of the health care organizations. That is, while these organizations may offer helpful and necessary advice, they should not be making the final decisions.

To confirm that health care organizations have followed the standard procedures for calculating measures, consider having the measures audited or requiring audited measures. To improve the consistency of auditing criteria and processes, NCQA certifies organizations to audit HEDIS® results from health plans. Since 1999, all health plans accredited by NCQA have had to submit HEDIS® results that have been audited by an NCQA-certified vendor.
For measures other than HEDIS®, sponsors may want to consider vendors that can apply the auditing principles recommended by NCQA. To minimize inconsistencies, hire the same vendor to handle all audits and confirm that all auditors use the same criteria in their work.

Step 3. Presenting the Information
Presentation—or how you say what you have to say—plays a critical part in ensuring that your efforts to convey quality information are successful. One of the most challenging aspects of a performance measurement project is figuring out how to present the data in a way that helps consumers interpret the information and apply it to their health care-related decisions. Many sponsors have struggled with this question, only to find themselves making the same mistakes as others before them. One of the key objectives of this site is to support project sponsors in learning from the experiences of their peers as well as from the findings of researchers regarding the best ways to discuss, format, and display information on quality.

Five Key Points About Presentation
Here are the five most important things to remember about presenting information on health care quality:
1. There is no one way to do this—but there are better ways and worse ways. At this time, there is no universally accepted approach to providing information on quality to consumers. The marketplace is full of experiments, most of which have not been evaluated. But we do know that some approaches to presenting quality information work better than others in the sense that consumers find it easier to understand the data and evaluate their options.
2. The answer that's best for you depends on who your audience is and how they'll use the information. The way you present information—and even the information itself—should be
driven by the needs of whoever is supposed to be reading it. Consumers are the focus of this Web site, but they are not the only audience for health care quality information. Sponsors can develop information for:
• Public or private purchasers.
• Non-purchasing intermediary organizations, such as consumer advocacy groups.
• Policymakers.
• Provider organizations.
• Individual providers.
• Health plans.
Each of these audiences has different needs for quality information. As a result, an approach that is appropriate for individual consumers may not be at all useful for a different audience.
For example:
• Plans and providers may want more detail in order to identify specific opportunities to improve quality.
• Policymakers, on the other hand, may want a higher level of aggregation that would reveal larger trends in the marketplace.
• Intermediary organizations and purchasers may want enough data to draw their own conclusions rather than having the information interpreted for them.
3. Data cannot be presented in a vacuum. The context you provide (or fail to provide) for the information affects what your audience pays attention to and how they interpret it. In particular, consumers are more likely to care about the information if you can connect it to their concerns about health care and the health care system. For instance, data on ease of referrals has greater relevance to an audience that understands how a health plan may limit their access to specialists. This implies that it is not enough to provide data; a quality report must include some explanation of how the health care system works and what the data reveal about a health care organization.
4. For the typical consumer, a quality measure has no meaning on its own. It is the sponsor's job to turn quality measures into information that consumers can easily comprehend, evaluate, and use. You can do this by doing one or more of the following:
• Grouping measures into consumer-friendly categories.
• Offering a basis for comparison, such as an average or benchmark for the market.
• Interpreting the information for your audience by making it clear which results are truly better than others.
5. The medium shapes the message. Whether you rely on printed reports, Web sites, or live presentations, the medium you choose to deliver the information can determine how much you present and how you display it. For instance, you can offer many more layers of detail on the Web than you can in print without overwhelming your audience. A printed report, on the other hand, offers the ability to create large displays of information across multiple pages. This suggests that you will need to have some sense of what the final product will be before you can decide on a design and format for quality information. Making Sure Your Materials Work for Your Audience No
matter how limited your resources may be, do what you can to test the materials as you develop them to make sure they are suitable for your audience. This approach allows you to identify and remedy trouble spots along the way rather than waiting until the information has been disseminated to discover any problems. Specifically, sponsors can conduct ongoing testing to assess:
• Whether consumers can read the information easily.
• Whether they can understand it.
• Whether the content is appropriate for your audience.
• Whether people are interested in your content (i.e., its salience).
• Whether consumers can use your materials for the purpose for which they are intended.
• Whether they can navigate through the materials to find the information they want.
Techniques for this kind of iterative testing include one-on-one interviews as well as focus groups.

Step 4. Disseminating Information

Long before you have the information to distribute, you need to be thinking about how and when to get it into the hands of consumers. Sponsors should ask themselves:
• What can we do to ensure that our audience is aware of our information and motivated to use it?
• When is the best time to make the information available? Is this timing realistic?
• What channels can we use to distribute the information to our audience? How can we make sure they see it?
• How should we package the information? Should it stand alone or be incorporated into other information?
The answers to these questions will affect how much time you have to produce the report as well as the kinds of measures and depth of content that you can include. For example:
• If the goal is to release a performance report in early fall so that consumers have it in time for the open enrollment season, you may not have enough time to conduct your own survey of enrollees but you could ask your plans to share the HEDIS® scores—which include results of the CAHPS® survey—that they have to report to NCQA by early summer.
• If the most sensible way to package the performance information is to integrate it into open enrollment materials, you will have to deal with space constraints that would not be necessary in a stand-alone document. This may affect the way you present the data or how much data you can include.

Step 5. Supporting Consumers
For many sponsors of consumer information projects, the job ends once the reports have been distributed. But both experienced sponsors and researchers testing consumer behavior have demonstrated that it is not enough to give consumers data. They need help in interpreting the information on quality, integrating it with other relevant data (such as costs), and using it to make decisions. Without this help, many simply ignore the information they have, or worse, use it inappropriately. Strategies for providing "decision support" include the following:
• Refer consumers to consumer advocates and other "information intermediaries" who can help your audience understand and use the information you provide. You may need to provide those intermediaries with training, scripts, and documents they can share with consumers. For example, the Centers for Medicare & Medicaid Services (CMS), formerly the Health Care Financing Administration, funds a Nationwide program called SHIP (State Health Insurance Assistance Programs) to help seniors work through insurance issues and answer their questions.
• Offer consumers a worksheet that guides them through the process of evaluating their options. Worksheets help the reader keep track of the information needed to make decisions. While they can be too complicated for some consumers, they are a valuable tool for the information intermediaries who may assist consumers in reaching decisions.
• Design computer-based systems that facilitate decision making by allowing the user to weight different factors or by ranking the available choices based on the user's response to a set of questions. To determine which strategy will work best for your audience, you may want to consult with representative consumers and/or appropriate intermediaries. Also, be sure to evaluate your support strategy once it is implemented to find out how well it is serving the needs of your
audience and how you can improve it.

Step 6. Evaluating the Project
Finally, the last step for sponsors is to evaluate the extent to which the project achieved its objectives. This could be as simple as asking whether consumers are aware of the information you produced or as complicated as finding out whether and how consumers used the
information to help make decisions. Evaluations are important for internal purposes because they enable you to determine how effective your project is and how it can be improved. But they are equally critical for external reasons. First, being able to demonstrate that the project has had a positive impact will help you secure political support and continued funding. In addition, an evaluation allows other sponsors to learn from your experience.
The following methods are commonly used to evaluate projects:
• Focus groups.
• Surveys.
• Usability testing.
• Analysis of changes in enrollment patterns.
Lets discuss the importance of risk management in accelerating the implementation of IS Plan.

Importance of Risk Management:

Risk management encompasses three processes: risk assessment, risk mitigation, and evaluation and assessment. Section 3 of this guide describes the risk assessment process, which includes identification and evaluation of risks and risk impacts, and recommendation of risk-reducing measures. Section 4 describes risk mitigation, which refers to prioritizing, implementing, and maintaining the appropriate risk-reducing measures recommended from the risk assessment process. Section 5 discusses the continual evaluation process and keys for implementing a successful risk management program. The DAA or system authorizing official is responsible for determining whether the remaining risk is at an acceptable level or whether additional security controls should be implemented to further reduce or eliminate the residual risk before authorizing (or accrediting) the IT system for operation. Risk management is the process that allows IT managers to balance the operational and economic costs of protective measures and achieve gains in mission capability by protecting the IT systems and data that support their organizations’ missions. This process is not unique to the IT environment; indeed it pervades decision-making in all areas of our daily lives. Take the case of home security, for example. Many people decide to have home security systems installed and pay a monthly fee to a service provider to have these systems monitored for the better protection of their property. Presumably, the homeowners have weighed the cost of system installation and monitoring against the value of their household goods and their family’s safety, a fundamental “mission” need. The head of an organizational unit must ensure that the organization has the capabilities needed to accomplish its mission. These mission owners must determine the security capabilities that their IT systems must have to provide the desired level of mission support in the face of realworld threats. Most organizations have tight budgets for IT security; therefore, IT security spending must be reviewed as thoroughly as other management decisions. A well-structured risk management methodology, when used effectively, can help management identify appropriate controls for providing the mission-essential security capabilities.

The First thing to do in preparing an IS Plan is to Gather Information and the technique use on gathering data.

Information-Gathering Techniques

Any, or a combination, of the following techniques can be used in gathering information relevant
to the IT system within its operational boundary:
• Questionnaire. To collect relevant information, risk assessment personnel can develop a questionnaire concerning the management and operational controls planned or used for the IT system. This questionnaire should be distributed to the applicable technical and nontechnical management personnel who are designing or supporting the IT system. The questionnaire could also be used during on-site visits and interviews.
• On-site Interviews. Interviews with IT system support and management personnel can enable risk assessment personnel to collect useful information about the IT system (e.g., how the system is operated and managed). On-site visits also allow risk. assessment personnel to observe and gather information about the physical, environmental, and operational security of the IT system. Appendix A contains sample interview questions asked during interviews with site personnel to achieve a better understanding of the operational characteristics of an organization. For systems still in the design phase, on-site visit would be face-to-face data gathering exercises and could provide the opportunity to evaluate the physical environment in which the IT system will operate.
• Document Review. Policy documents (e.g., legislative documentation, directives), system documentation (e.g., system user guide, system administrative manual, system design and requirement document, acquisition document), and security-related documentation (e.g., previous audit report, risk assessment report, system test results, system security plan5, security policies) can provide good information about the security controls used by and planned for the IT system. An organization’s mission impact analysis or asset criticality assessment provides information regarding system and data criticality and sensitivity.
• Use of Automated Scanning Tool. Proactive technical methods can be used to collect system information efficiently. For example, a network mapping tool can identify the services that run on a large group of hosts and provide a quick way of building individual profiles of the target IT system(s).

System Characterization

In assessing risks for an IT system, the first step is to define the scope of the effort. In this step, the boundaries of the IT system are identified, along with the resources and the information that constitute the system. Characterizing an IT system establishes the scope of the risk assessment effort, delineates the operational authorization (or accreditation) boundaries, and provides information (e.g., hardware, software, system connectivity, and responsible division or support personnel) essential to defining the risk. System-related information used to characterize an IT system and its
operational environment. Information-gathering techniques that can be used to solicit information relevant to the IT system processing environment. The methodology described in this document can be applied to assessments of single or multiple, interrelated systems. In the latter case, it is important that the domain of interest and all interfaces and dependencies be well defined prior to applying the methodology.

System Related Information

Identifying risk for an IT system requires a keen understanding of the system’s processing environment. The person or persons who conduct the risk assessment must therefore first collect system-related information, which is usually classified as follows:
• Hardware
• Software
• System interfaces (e.g., internal and external connectivity)
• Data and information
• Persons who support and use the IT system
• System mission (e.g., the processes performed by the IT system)
• System and data criticality (e.g., the system’s value or importance to an organization)
• System and data sensitivity.4
Additional information related to the operational environmental of the IT system and its data includes, but is not limited to, the following:
• The functional requirements of the IT system
• Users of the system (e.g., system users who provide technical support to the IT system; application users who use the IT system to perform business functions)
• System security policies governing the IT system (organizational policies, federal requirements, laws, industry practices)
• System security architecture
• Current network topology (e.g., network diagram)
• Information storage protection that safeguards system and data availability, integrity, and confidentiality
• Flow of information pertaining to the IT system (e.g., system interfaces, system input and output flowchart)
• Technical controls used for the IT system (e.g., built-in or add-on security product that supports identification and authentication, discretionary or mandatory access control, audit, residual information protection, encryption methods)
• Management controls used for the IT system (e.g., rules of behavior, security planning)
• Operational controls used for the IT system (e.g., personnel security, backup, contingency, and resumption and recovery operations; system maintenance; off-site storage; user account establishment and deletion procedures; controls for segregation of user functions, such as privileged user access versus standard user access)
• Physical security environment of the IT system (e.g., facility security, data center policies)
• Environmental security implemented for the IT system processing environment (e.g., controls for humidity, water, power, pollution, temperature, and chemicals). For a system that is in the initiation or design phase, system information can be derived from the design or requirements document. For an IT system under development, it is necessary to define key security rules and attributes planned for the future IT system. System design documents and the system security plan can provide useful information about the security of an IT system that is in development. For an operational IT system, data is collected about the IT system in its production environment, including data on system configuration, connectivity, and documented and undocumented procedures and practices. Therefore, the system description can be based on the security provided by the underlying infrastructure or on future security plans for the IT system.


Threats On Implementing IS Plan:

The goal of this step is to identify the potential threat-sources and compile a threat statement listing potential threat-sources that are applicable to the IT system being evaluated. A threat-source is defined as any circumstance or event with the potential to cause harm to an IT system. The common threatsources can be natural, human, or environmental.
In assessing threat-sources, it is important to consider all potential threat-sources that could cause harm to an IT system and its processing environment. For example, although the threat statement for an IT system located in a desert may not include “natural flood” because of the low likelihood of such an event’s occurring, environmental threats such as a bursting pipe can quickly flood a computer room and cause damage to an organization’s IT assets and resources. Humans can be threat-sources through intentional acts, such as deliberate attacks by malicious persons or disgruntled employees, or unintentional acts, such as negligence and errors. A deliberate attack can be either (1) a malicious attempt to gain unauthorized access to an IT system (e.g., via password guessing) in order to compromise system and data integrity, availability, or confidentiality or (2) a benign, but nonetheless purposeful, attempt to circumvent system security. One example of the latter type of deliberate attack is a programmer’s writing a Trojan horse program to bypass system security in order to “get the job done.”

System Security Testing

Proactive methods, employing system testing, can be used to identify system vulnerabilities efficiently, depending on the criticality of the IT system and available resources (e.g., allocated funds, available technology, persons with the expertise to conduct the test). Test methods include
• Automated vulnerability scanning tool
• Security test and evaluation (ST&E)
• Penetration testing.6
The automated vulnerability scanning tool is used to scan a group of hosts or a network for known vulnerable services (e.g., system allows anonymous File Transfer Protocol [FTP], sendmail relaying). However, it should be noted that some of the potential vulnerabilities identified by the automated scanning tool may not represent real vulnerabilities in the context of the system environment. For example, some of these scanning tools rate potential vulnerabilities without considering the site’s environment and requirements. Some of the “vulnerabilities” flagged by the automated scanning software may actually not be vulnerable for a particular site but may be configured that way because their environment requires it. Thus, this test method may produce false positives. ST&E is another technique that can be used in identifying IT system vulnerabilities during the risk assessment process. It includes the development and execution of a test plan (e.g., test script, test procedures, and expected test results). The purpose of system security testing is to test the effectiveness of the security controls of an IT system as they have been applied in an operational environment. The objective is to ensure that the applied controls meet the approved security specification for the software and hardware and implement the organization’s security policy or meet industry standards. Penetration testing can be used to complement the review of security controls and ensure that different facets of the IT system are secured. Penetration testing, when employed in the risk assessment process, can be used to assess an IT system’s ability to withstand intentional attempts to circumvent system security. Its objective is to test the IT system from the viewpoint of a threat-source and to identify potential failures in the IT system protection schemes.

Laptops for Students

The implementation is so important that students will be asked to return to school two days early to be introduced to the laptops. During these two days, students will be involved in induction classes that will take them through the essential concerns of using the new laptops in school. The students will complete two days of formal training with technology specialists and their presence is mandatory. At the end of the induction session, a test will be taken to identify students that can possibly receive further assistance during the start of the year.
The students will be assigned their laptops at before the start of the school year and will be asked to sign an acceptable user policy agreement form and encouraged to personalize their new laptops in case they get assigned laptops for the year. The administrative and professional development teams will assist teachers in introducing the students in understanding how the program will be run and what their responsibilities for using laptops will be.
In addition, parents will also be sent an policy agreement that covers all the necessary information about the consequences of mistreatment of the equipment. This document will also have insurance information. Parents are required to sign this docuemtn and send it back to school.

Staff Development

Teachers and administrators will be the first ones to have a chance to get familiarized with the equipment that will be introduced in their classrooms. It will be necessary to prepare comprehensive tutorials or manuals to allow a quick switch into using the new technology. The professional development group will have finalized their plans for training sessions and will have begun designing the instruction. This instruction will include specific information about the change of school structure as a well as content and grade specific methods for conducting student-centered classes. Teacher responsibilities and technology integration strategies for student-centered project-based units of study will be included.
The administrative team and the professional development team will be carrying out intensive, paid, summer training sessions to prepare teachers for the changes to come in the fall. Teachers will then be given time to restructure their lessons and will have support available when they have problems.
Numerous schools have found ways to adjust schedules and provide one hour of planning and inservice for teachers while maintaining state requirements for students contact time. In some schools teachers have agreed to start earlier and end later each day as well as give up some recess or duty time in order to develop a one-hour block of time per week for inservice and planning. A key is to make sure that at least one early-out per month is devoted to a technology inservice activity.
It is crucial that consideration be given to teacher learning well in advance of the arrival of computers in the classroom. The list that follows is a brief synopsis of beneficial staff development suggestions:
Formulate detailed plans for staff development and implementation.
Decide who will lead staff development programs and evaluate each stage of implementation.
Develop a working schedule for the staff development program.
Determine appropriate staff development activities for special services and support staff.
Identify who will lead and evaluate staff development for auxiliary staff members.
Identify in-house technical consultants who will help teachers deal quickly with problems that might arise.

Technical Support

Maintaining and servicing networked equipment continues to be a challenge for schools' effective use of technology. More states are now requiring that districts and schools have a technology specialist or coordinator who supports teachers in integrating instruction and technology before that district can receive state funding. Schools could also have in-house technical support to deal with all the technical problems that could arise. You should foresee a great number of incident reports that deal with student damaging display screen or damaging equipment because of negligence in carrying them.
The summer before the implementation, the same groups will be working to get things ready for the students in the fall. The goals are to have the technology in place to facilitate as smooth a transition as possible. The technology team will receive the laptops, inventory them and load them with the chosen operating systems and software. They will also check connectivity at each school and important points around the district to ensure that the laptops can work from the first day of school. Finally, they will create a yearly maintenance plan for cleaning and preventative care.
If staff or students need to use equipment like projectors, digital cameras or even cables, they can request the media center to facilitate the equipment and provide operational guidance.

Flexible Scheduling

They will also conduct public relations meetings for members of the community to inform them about the specifics of the program, including the change from a seven period isolated subject schedule to a more integrated block schedule that includes math-science-art blocks, history-literature-reading-writing-music blocks, world language-history-art music blocks and physical education-art-music-history blocks. They will explain the benefits of changing the school structure to a more constructivist, student- centered one by explaining the theory of how students learn best and demonstrating some proposed class exercises.
Flexible scheduling provides quality time either in the lounge or in the classroom for specific staff members to get together and share ideas about technology. A bonding often occurs between the mentor-teacher and the staff member needing encouragement. This new-found relationship helps solve technical problems and misunderstandings and opens the way for future inservice opportunities.

Local Internet

Data intranets are becoming commonplace in schools. Intranets give schools an unprecedented ability to manage their budgets, buy supplies, and analyze student data. For example, districts are using the data intranet to provide information on student records, text scores, attendance, and health information, to create student profiles.

Additional Key Points

The key to success with technology is allowing teachers to develop a sense of ownership of the school's technology. Once teachers develop a sense of ownership, they will be ready to move on to higher levels of technology use. When all is said and done, it will be teachers who determine the success or failure of a technology plan. They are the people who connect technology with curricular practice in a way that will enhance student achievement. In every class, teachers must contend with a variety of learners, such as the fast-paced learner, the less-motivated learner, students with learning difficulties, and the list could go on. With computers in the classroom, teachers have access to tools that have potential for providing learning experiences relevant to each of these unique learners.

Infrastructure

When speaking of infrastructure, one is generally referring to the basic facilities and mechanical and electrical installations found in a school. These facilities and installations form the foundation for proposed technology upgrades. The following points provide a brief outline of things to consider when reviewing infrastructure:
Decide how existing equipment and infrastructure can be integrated into the project.
Visit other schools to evaluate successful programs for structural adaptations that could be copied and, in particular, look for unique ideas to solve local problems.
Make sure that the network wiring satisfies the needs of the teachers.
Make sure to count with the necessary expertise to ready the infrastructure for implementation.
Make sure professionals are brought in order to handle remodeling and other infrastructure needs.
The technology staff will run diagnostics on the district to check for adequate connectivity and electrical resources and take action to fix any inadequacies or to bolster the already existing systems.

Teaching and Learning

When considering how technology will be brought into the classroom, both teaching and learning should be considered. Several points to remember when considering the effects of technology on teaching and learning are:
Evaluate hardware purchases and coordinate them to student needs. Consider features like user-friendliness, dependability, and speed.
Evaluate projected software purchases to determine which programs will best complement, support, and expand classroom teaching and learning.
Evaluate planned software purchases for comprehensiveness and user-friendliness. Comprehensiveness is important because ease of use flattens the learning curve and helps ensure that the programs will be used. When checking the software programs, all updates to versions and site licenses will also be completed.
Determine the simplest approach that will effectively bring computers into the teaching and learning environment. Simplicity aids understanding and allows stakeholders to support the process more readily.
Establish dialogues with teachers to evaluate classroom space and decide on computer locations withing each classroom.
Determine the amount of use teachers will make of the new technology.
Regardless of the size of the technology project, standardizing hardware and software are essential to maintaining control of the technology. Having a single configuration for all computers helps simplify maintenance. More time can be spent using the technology.

Leadership

Quality leadership must prevail at all stages of the project. Below is a list of important factors to consider when a technology project is being led:
Keep students' and teachers' needs at the forefront during the various stages of the technology planning process.
Consider how students and staff members will be affected by the technology changes and develop appropriate support structures like training, changes in classroom layout, and inclusion into curricula.
Review school programs to determine how course subjects may be adjusted to make use of technologies in the classroom.
Consider the possibility of having to modify school practices or upgrade regulations.
Envision what the completed project will look like and what it will do for teaching and learning.
Financial Management
Most determinations about finance, generally dealt with at middle and upper management positions, will have a critical impact to the success of the larger groups. Several points are listed below to provide a general overview of the financial management process:
Itemize equipment resources owned by the school. The goal is to look to reduce unnecessary duplication in new purchases. Create an inventory of all technology related items including desktops, laptops, printers and other peripherals, accessories such as mice, power cords, keyboards, all software programs and furniture used for tech purposes.
Determine if the proposed equipment will be purchased locally or from a national distribution company. Decide who will be responsible for handling the recommended purchases.
Review all costs to make sure the technology project is affordable in all its phases.

Community Awareness and Support

Community support is necessary during the planning stages of the technology initiative. It is also true that many parents want to be informed about the development of the project in their children's education. Take into account the following factors in order to provide general information to the parents:
Consider how you will be able to show community members how teachers are adopting this technological direction onto their curriculum.
Address parents' and community members' concerns over how technology in the classroom will enhance student learning and achievement.
Show parents and members of the community how they and their children can benefit from the process of networking technologies in district classrooms.
Develop guidelines for presenting information to the public. Be sure all news releases are verified with the public relations director before they go public.




"those are the possible things or steps that could help me implement properly the IS Plan of the University and most possibly the implementation will be accelerated according to the data gathered..."



The ISP Development Steps
The information systems plan project determines the sequence for implementing specific information systems. The goal of the strategy is to deliver the most valuable business information at the earliest time possible in the most cost-effective manner.
The end product of the information systems project is an information systems plan (ISP). Once deployed, the information systems department can implement the plan with confidence that they are doing the correct information systems project at the right time and in the right sequence. The focus of the ISP is not one information system but the entire suite of information systems for the enterprise. Once developed, each identified information system is seen in context with all other information systems within the enterprise.

1.)Develop a high-level data model - The high level data model is created in two steps: building database domains, and creating database objects. It is critical to state that the objective of this step is the high-level data model. The goal is NOT to create a low level or fully attributed data model.
The reasons that only a high-level data model is needed is straight forward:
1.)No database projects are being accomplished, hence no detailed data modeling is required
2.)The goal of the ISP is to identify and resource allocate projects including database projects and for that goal, entity identification, naming and brief definitions is all that is required for estimating. The message is simple: any money or resources expended in developing a detailed data model is wasted.The high-level data model is an Entity Relationship diagram created to meet the data needs of the mission descriptions. No attributes or keys are created.
2.1.) Create Database Domains- Database domains are created from the “bottom” leaves of the mission description texts. There are two cases to consider. First, if the mission description’s bottom leaves are very detailed, they can be considered as having being transformed into database domains. That is they will consist of lists of nouns within simple sentences.
The other case is that the mission descriptions have been defined to only a few levels, and the lists of nouns that would result from the development of database domains have yet to be uncovered series of diagraming techniques created especially for data and the relationships among data is called entity-relationship (ER) diagraming.
Within one style of this technique, the entities are drawn as rectangles and the relationships are drawn as diamonds. The name of the relationship is inside the diamond. Another style of ER modeling is to just have named lines between the entities. In this methodology, since the domain of the diagram is data, it is called the database domain diagram. The purpose of the database domain diagram is not to be precise and exacting but to be comprehensive. The goal is to have the reviewer say, “that's just the right kind of data needed to satisfy the required mission description.” When all the database domain diagrams are created, siblings are combined. Entities that are named the same are not presumed to be the same. Analysis must show that to be true. If not, one or both of the entities must have their name and definition changed. As the sets of sibling diagrams are merged from lower to higher levels, the quantity of commonly named entities on different diagrams diminishes. Diagram merger becomes optional when the use analysis of a common entity is subject to update (add, delete, or modify) in one diagram and is only referenced (read) in another diagram.
2.2.) Define Database Objects - In today's parlance, a lucid policy-procedure pair is called a business object. When the policy procedurepair are completely defined within the language constructs of ANSI/SQL and is stored, retrieved, and maintained in an ANSI/SQL database through a sequence of well-defined states, the business object is a database object.
The goal of database object analysis is to enable the definition of both the data structure and the data structure transformations that:
a.)Installs a new database object in the database
b.)Transforms a database object from one coherent state to another
c.) Removes a database object from the database.Database objects are found by researching business policies and procedures. Database objects are however much more than just collections of policy-homogeneous entities.
In fact database objects consist of four main parts:
1.Data Structure: the set of data structures that map onto the different value sets for real world database objects such as an auto accident, vehicle and emergency medicine incident.
2.Process: the set of database object processes that enforce the integrity of data structure fields, references between database objects and actions among contained data structure segments, the proper computer-based rules governing data structure segment insertion, modification, and deletion. For example, the proper and complete storage of an auto accident.
3. Information System: the set of specifications that control, sequence, and iterate the execution of various database object processes that cause changes in database object states to achieve specific value-based states in conformance to the requirements of business policies. For example, the reception and database posting of data from business information system activities (screens, data edits, storage, interim reports, etc.) that accomplish entry of the auto accident information.
4. State: The value states of a database object that represent the after-state of the successful accomplishment of one or more recognizable business events. Examples of business events are auto accident initiation, involved vehicle entry, involved person entry, and auto accident DUI (driving under the influence of alcohol/drugs) involvement. Database object state changes are initiated through named business events that are contained in business functions. The business function, auto accident investigation includes the business event, auto-accident incident initiation, which in turn causes the incident initiation database object information system to execute, which in turn causes several database object processes to cause the auto accident incident to be materialized in the database.A database object is specified to the SQL DBMS through the SQL definition language (DDL). All four components of a database object operate within the “firewall” of the DBMS. This ensures that database objects are protected from improper access or manipulation by 3GLs, or 4GLs. A DBMS that only defines, instantiates, and manipulates two dimensional data structures is merely a simplified functional subset of the DBMS that defines, instantiates, and manipulates database objects. Database objects are completely defined within the database object column of the Knowledge Worker Framework. They are interfaced to the “outside world” by means of business information systems through SQL views. Each view represents the entire set of data, or some subset of a set of data that truly reflects a known value state of the database object. Culling out the database objects from 600 or so entities requires three simple questions:a.)Does the entity represent only a single value? For example, when the entity, Salary is really a business fact, it should be represented in the metabase as a data element, b.)Does the entity represent a collection of business facts from withing another context? For example, when the entity, Critical Contract Dates, represents multiple business facts, but within the context of the contract, the entity is a property class, and is stored in the metabase as such, c.)Does the entity represent multiple collections of business facts and is self-contained as to context? For example, when the entity, Contract, contains multiple property classes such as critical dates, signatories to the contract, terms and conditions, items and item quantities, and the like, the entity is a database object and is stored in the metabase as such.

3.)Create the resource life cycles (RLC) and their nodes - Resources are drawn from both the mission descriptions and the high level data model. Resources and their life cycles are the names, descriptions and life cycles of the critical assets of the enterprise, which, when exercised achieve one or more aspect of the missions. Each enterprise resource Alives@ through its resource life cycle. A mission might be human resource management, where in, the best and most cost effective staff is determined, acquired and managed. A database object squarely based on human resources would be employee. Within the database object, employee, are all the data structures,procedures, integrity constraints, table and database object procedures necessary to “move” the employee database object through its many policy-determined states. A resource might also be named employee, and would set out for the employee resource the life cycle stages that reflect the employee resource’s “journey” through the enterprise. While an enterprise may have 50 to 150 database objects, there are seldom more than 20 resources. Enterprises build databases and business information systems around the achievement of the life cycle states of its resources. Business information systems execute in support of a particular life cycle stage of a resource (e.g., employee promotion). These information systems cause the databases to change value-state of contained database objects to correctly reflect the resource’s changed state. The state of one or more database objects in the database is the proof that the resource’s state has been achieved. Resources become the lattice work against which database and business information systems are allocated. The table that follows presents the basic components of resources and their life cycles.

The way to success is the proper way f planning , predicting the problems that may result destruction and failure of the organization by having strategical solutions and plan to fight it up.
However, to elaborate and make a clearer view about the topic, we must first define and expose its real meaning that define by the author.
-Information System (IS) Today, James O'Brien,2003.McGraw Hill Company Inc.,
Information System can be any organized combination of people, hardware, software, communication networks and data resources that collects, transforms and disseminate information in an organization. While Business plan is a formal statement of a set of business goals, the reason why they are believed attainable and the plan reaching those goals.
-www.wikipedia.com
Business is first established than Information Technology (IT). Filipino started trading through barter system until such time that we learned to use for business transaction. In regards on the widely spread of business throughout the globe, managing information files was done manually until during 1970’s. In part of this year, information workers exceeded 50% of the work force. This is due of bigger and longer the company operates the larger documentation files stored and processed, although in the late 1950’s and early 1960’s. “IT” hardly exist still its compatibility and usability was not yet disseminated well. They were started using computer for data processing applications, their impact was comparatively modest. This was all because this change could not come too quickly to satisfy user needs. But, still people tried so hard to make things possible in which after late 1960’s, Information work grew rapidly. Through this responds we now make use IT resources effectively and efficiently.
Nowadays, proper designation and implementation of the Information Systems (IS) will become a big factor to the business prosperity. That is why Business plan correlates with Information System Plan.
The both elements are very important and specials in an organization. With the aid of this two, the business will prosper. Proper handling of information system will help in decision making while having a good business plan that will lead you where your business is going, it will be your map in your journey to successful business. It might be the road to taken be not so smooth but having a good business plan to address and overcome the circumstances that comes along the way.
All of the success in the business and in the field of technology is not by luck but with the proper, appropriate and correct management and planning. But as of this moment we will tackle about essentiality of having a good plan in both the business and in the Information Systems area. When we talks about planning it is a crucial task. Its because of some factors to be considered such as long time for hardware delivery, the difficulty of software development and the preparation needed for training and implementation have all demanded advance planning. This planning task has been primarily technical, specifically focuses on hardware and software and its relationship into the business industry. It is a preparation of one business or one system how to improve one's organization for the days or years to come. It is trying to respond in the changes and challenges that blocks the way of success. It is strategically approach of new ideas, new techniques, new business strategies and new systems, which intentionally gives a positive impacts in the business and organizations. For instance, the business makes a plan first before implementing something, like purchasing the new system for the new accounting system. Before the system may come in to reality it must to pass through different and formal process, the request must be done in the sequential and documentary way, like stating the purpose, the benefits, people involve , cost and many more to consider just to be approved. And for some like small business before they have a new machine it would be studied first if the cost would be worth to take the risk, and become the cause of the delay. After the evaluation if it really not approved, the owner would ask for any alternative that is low cost but functional though not so good in quality and performance as long as it fits on the budget, they will go for it, but still before it come to reality it passed to a long process and studied well by all concern. What I want to say is that planning done properly to find its effectiveness and usefulness in any organization.
It is also use to identify the company's strengths and weaknesses, potential problems, and emerging issues. They set forth performance standards on which expectations will be based, and clearly define goals and objectives to allow for coordination and better communication between all company areas. All these elements are taking impart in the industry because it is their map for giving a clearer view about the future struggles and difficulties. All of this is commonly use by the organization, because without this is like putting yourself in war without bringing any weapon to defend yourself, it surely kills you without a fight. Having no Strategic Plan and business Plan is a suicidal, you are putting the company at stake. Therefore, always be vigilant and always be prepared, by doing this will be key to succeed.

It is a master plan that sets the enabling policy and institutional infrastructure and environment, as well as the direction, priorities, and benchmarks for computerization of key government operations and activities over the next five to ten years. It is a plan to fully harness the potentials of ICT for good governance and promote transparency and accountability in government operations and transactions. The GISP was formulated in consultation with various stakeholders -- government agencies, the private sector, civil society, media, the academe, and other critical players in governance and the information and communications technology community.

Before we discuss about what was that, here are some guidelines on how to make and effective information system plan. Before that, here are some characteristics of a quality information system.

1. Timely - The ISP must be timely. An ISP that is created long after it is needed is useless. In almost all cases, it makes no sense to take longer to plan work than to perform the work planned.
2. Useable - The ISP must be useable. It must be so for all the projects as well as for each project. The ISP should exist in sections that once adopted can be parceled out to project managers and immediately started.
3. Maintanable - The ISP must be maintainable. New business opportunities, new computers, business mergers, etc. all affect the ISP. The ISP must support quick changes to the estimates, technologies employed, and possibly even to the fundamental project sequences. Once these changes are accomplished, the new ISP should be just a few computer program executions away.
4. Quality - While the ISP must be a quality product, no ISP is ever perfect on the first try. As the ISP is executed, the metrics employed to derive the individual project estimates become refined as a consequence of new hardware technologies, code generators, techniques, or faster working staff. As these changes occur, their effects should be installable into the data that supports ISP computation. In short, the ISP is a living document. It should be updated with every technology event, and certainly no less often than quarterly.
5. Reproducible - The ISP must be reproducible. That is, when its development activities are performed by any other staff, the ISP produced should essentially be the same. The ISP should not significantly vary by staff assigned.

References:
Back to top Go down
http://venus_astarte16@yahoo.com
 
Assignment 4 (Due: December 17, 2009, before 01:00pm)
Back to top 
Page 4 of 4Go to page : Previous  1, 2, 3, 4
 Similar topics
-
» Assignment 6 (Due: December 30, 2009, before 01:00pm)
»  Assignment 1 (Due: December 12, 2011, before 01:00pm)
» Assignment 5 (Due: December 23, 2009, before 01:00p
» Assignment 3 (Due: before December 06, 2009, 13:00hrs)
» Assignment 4 (Due: December 19, 2011, before 01:00pm)

Permissions in this forum:You cannot reply to topics in this forum
USEP-IC  :: MIS 2-
Jump to: