StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Strategic Information Systems - TickIT and CMMI - Case Study Example

Cite this document
Summary
The paper "Strategic Information Systems - TickIT and CMMI" is an outstanding example of an information technology case study. There are many problems associated with the introduction of automated testing tools in an organization where none existed before. Some of the challenges that will be encountered include a lack of proficiency by the employees that are required to draw the automation scripts…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful

Extract of sample "Strategic Information Systems - TickIT and CMMI"

Name : xxxxxxxxxxx Institution : xxxxxxxxxxxx Title : Strategic Information Systems Tutor : xxxxxxxxxxx Course : xxxxxxxxxxxx @2010 Strategic Information Systems 1(a) Potential problems and disadvantage of automated testing tool There are many problems associated with the introduction of automated testing tool in an organization where none existed before. Some of the challenges that will be encountered include lack of proficiency by the employees that is required to draw the automation scripts. Debugging of the test scripts is also a major challenge. The consequences of having an error in the test scripts are deadly. Test maintenance is expensive especially when playback methods are involved. Test scripts need to be re-recorded or replaced by new ones. Maintenance of test data files is also a problem especially when the script tests require more screens. The process will experience other problems such as no human insight, assumptions in the scripts and style sheets and failure of the dynamic content and multimedia. The process ignores table linearization and data table involvement. There are also conflicts in the results (Bray, 1999). b) Identification of a suitable automated testing tool i) The plan step There are a number of factors to consider in the planning step in order to select an appropriate automation testing tool. Some of the factors to consider are: Number of external interfaces The complexity of automated testing is dependent on the number of interfaces in a system. Whenever software is being tested, simulators are applied in all its external interfaces in an effort to assess its validity and appropriateness. Automated testing is realized by drawing scripts at these simulators. Thus if a software has several external interfaces, whole automated testing requires efforts in selecting and customizing tools at every interface and scripting. A system with several interfaces under test will have a complex automated test set-up and cost-effectiveness of the process will be reduced. Type of external interface Testing requires to be carried out with real standard interfaces as opposed to simulators. The challenges to this situation are that invalid behavior becomes difficult to test while complete automation is not applicable on these interfaces. The soft ware needs to be tested manually if the interrupts result from hardware interface. The automation testing tool should basically support: Scripting interface, Facility to provide all categories of valid and invalid input Facility to control IUT Logging facility Ability to support scripts in batch mode ii) The Do, Check, Act steps The factors following are considered in the Do, Check, Act steps in the selection of a suitable automation selection tool. Number of releases expected for testing Productivity of automation µ Number of testing cycle expected The main aim of the automation process is to minimize efforts and man hours in carrying out the operations of the business. The effort in the implementation of the system is thus a major consideration at this point. The process will begin with the selection of the tools followed by customization development and verification of scripts and realization of a test management system. Customization of the tool The tool selected should be customized according to the testing requirements to check whether it meets its expectations or the expected outcomes. Customization should be generic and allowance for enhancement should be left. Development and verification of scripts This is also important in the selection of automation testing tools in order to provide flexibility to create scripts either for valid or invalid situations. The last step is usually the implementation of the Test Management (System Public Safety Canada, 2001). 2. a) benefits and disadvantages to the business of implementing Benefits of implementing TickIT and CMMI CMMI and TickIT are important in the quality control, scheduling and budget of all processes in a firm. The CMMI and TickIT assist firms in implementing designs that and value evaluation decisions that optimize on the integration between quality, time and cost (Beth, 2007). Other benefits are: Design and document quality management CMMI and TickIT are very useful in the design and document quality management. The two programs provide a solid continuity throughout the design, documentation, and construction process which assist a firm in realizing its objectives by executing every procedure or phase in the most appropriate way. The programs’ architects lead in a follow up procedure to access the progress of the programs. They also conduct regular meetings involving all the project key team members to deliberate on program improvements. CMMI organizes and distributes meeting minutes consisting of specifications assigned to particular project team members. The programs’ management team conducts regular pre-planned checks and executes formal, structured internal reviews in order to enhance quality and coordination (Beth, 2007). The programs employ checklists to check on compatibility with regular technical practices, enhance material applications, competence and clarity. System coordination and public safety are also enhanced by the programs. Disadvantages of implementing TickIT and CMMI Avoiding maturity levels is normally counterproductive An overall rating for a group of processes cannot be established. If not carefully planned, the program can be expensive. (b) (i) the six sub-characteristics of ISO 9126 Functionality: this entails the functions that a software product offers to meet the requirements of the user. Reliability: entails the capacity of a soft ware to perform its functions. Usability: this describes the efforts one requires in order to use the software Efficiency: is associated with the expenses required to implement a software Maintainability: this is associated to the effort required to make changes to the software Portability: this is associated with the capacity of the software to be used in diverse environments. ii) Collection of metrics for each of the six sub-characteristics The metrics for each of the sub-characteristics are collected by analyzing their sub-characteristics. The sub-characteristic functionality consists of the following: Suitability-assessing the appropriateness of the software Accuracy-this is the correctness of the functions of the software Interoperability-this refers to the capacity of the software to interact with other systems Compliance-refers to legality of the software Security-refers to the privacy of the software component The sub-characteristic reliability consists of the following: Maturity-this attribute checks the frequency of failure of the software in application Fault tolerance-checking the ability of a software to recover from a component failure is an useful metric in assessing reliability Recoverability-concerned with the time and resources a software will need to bring it back to original operation The sub-characteristic usability consists of the following: Understandability-relates to understanding of the functionability of the software Learnability- involves assessing the level of expertise required to run the software. Operability- involves assessing the ease in which the software can be run by different users in diverse environments The sub-characteristic efficiency consists of the following: Time behavior-relates to rate of operation of the software Resource behavior-involves an assessment of the resources required to operate the software The sub-characteristic maintainability consists of the following: Analysability- assessing the possible causes of failure of software. Changeability-evaluates the efforts required to alter the software Stability-assesses the sensitivity of changing the system Testability-evaluates the efforts needed to test an alteration in the system The sub-characteristic portability consists of the following: Adaptability-this is the ability of the system to fit in diverse environments Instability-describes the effort needed to install the software Replaceability-describes the ease of changing a particular software component 3 a) Handling and use of laptops and other portable devices There are several precautions to enhance the safety of laptops and other portable devices while travelling. Some of the precautions to include: No place is safe While travelling never assume that any place is safe. Always keep an eye on the laptop. Use a non descript carrying case It is advisable to carry the laptop or any other device in a case that does not reveal its contents. This will minimize the chances of getting the device stolen. Beware of payphone Payphones can be thieves’ hideouts. Thieves might pick the cases containing the devices while busy calling or operating the devices. When travelling by air While travelling by air one needs to be very careful of the sophisticated professional crime rings targeting the laptops of the plane passengers. These will tend to look for new and expensive laptops which obviously contain important data. When travelling by car While travelling by car never leave the laptops in the car while having some lunch or when away from the car. While staying in a hotel Always keep a watch on valuable commodities while in hotel rooms bearing in mind that thieves are aware of the valuable devices carried by travellers especially those on business trips. When attending conventions and conferences Keep a close watch on the laptops while attending conventions and conferences b) Procedures to maximize the protection of the organization’s data Use the NTFS file system use the NTFS file system to safeguard data from laptop thieves who may try to access private data is recommended. Disable the Guest Account disabling the guest account will minimize the chances of thieves accessing any data stored in laptops. Complex passwords to the account can also be used. Rename the Administrator Account although data hackers will still make efforts to access data, renaming the administrator account will give them a challenge and will possibly prevent starters from accessing the data. Create dummy Administrator account Another strategy is open a normal account "Administrator", then deny that account privileges and make it impossible to access the guest password. Prevent the last logged-in user name from being displayed EFS (Encrypting File System) Windows 2000 comes with a strong encryption system that strengthens the security of the system. This will assist in preventing hackers from accessing data in the laptops by connecting another hard disk to the laptop. Disable the Infrared Port on the laptop infrared is usually used by hackers to access other people’s information more than it is used to transfer or share information. Backup any data before travelling Data should have a back while travelling since replacing lost data is always expensive than replacing the hard ware in most companies. Consider using offline storage for transporting sensitive documents 4. a) risks associated with the online trading Risk of hackers News ways are always emerging of stealing traders’ username and password in order to access their accounts and defraud them of their money. Hackers sell all the shares owned by the traders and transfer the money to their accounts. This can be prevented by keeping the username and passwords as secretive as possible. Risk of loss in excess of 100% of all the investment Online trading is highly speculating and traders should be prepared to lose even the entire investment. This is due to the enhanced leverages created by the margins (Raja &Rodolfo, 1997). Delays in trading systems These are major challenges and drawbacks to the online trading due to the uncertainty accompanied by the delays. Movement of stock prices Technology has brought about dramatic and rapid price movements in online trading. The traders should always be careful of the competition in the online trading which brings about movements of the stock prices. Other risks include: Risks of placing initial margin payment High level of risk when trading in foreign exchange b) The membership of the Business Continuity Planning team The membership of Business Continuity Planning team is composed of four types of team members: team leaders technical team members business process team members supporting team members Team members Although not all team members are involved in every BCP process, the team leader has a role of ensuring that talents and skills are utilized to the maximum. All of the team members will recognise the efforts of their team leader. Technical team members Technical team members are an important constituent of the Business Continuity Planning since technology is a significant part of planning for business continuity. Modern organizations rely on data for all their operations ranging from sales to human resources. Business process team members Business process team members are involved with safeguarding the business from the impact of risks and threats. These members should have expertise in the firm’s business process. Supporting Team members These offer support and advice to other members of the Business Continuity Planning team. c) The content of the Business Continuity Plan A business continuity plan consists of: Plans, measures and procedures to ensure the progressive delivery of vital services and commodities, which allows the firm to recover its equipments, data and assets Identification of the appropriate resources to enhance business continuity, including human resources, information, tools, financial allocations, legal counsel, safe guarding of infrastructure and accommodations. A business continuity plan is a six-step process. The steps are: 1. Building a team. 2. Definition of scenarios. 3. Make decisions. 4. Document the plan. 5. Get the word out. 6. Maintain the plan. The Business continuity plan begins with the building of the team. The team is composed of the following: team leaders technical team members business process team members supporting team members Each of the team’s roles is then outlined in the plan. This is done in order to speed up decision making process. The plan also contains the objectives of the entire plan. Another item in the business continuity plan is the description of scenarios. Examples of technical Backup Scenarios include the missed deliveries of state programs, the regular equipment failure and local building evacuation. Communication scenarios in the plan include internal communication with the staff, PRSS and other listeners. 5. a) The implications of teleworking from the perspective of the management of the organization Teleworking is advantageous for an organization as it helps it with increasing the productivity of the employees. This is because workers are able to put more hours onto their work since they work from home and therefore work efficiently without any office related distractions and other interruptions that are common at the office. It has been found that employees who work from home increase their productivity by 10 to 30 percent (Kugelmass, 1995). It also significant as it helps an organization to reduce the cases of absenteeism amongst its employees. When employees work from home, an organization is faced with fewer cases of sick days off which result in the employees not coming to work. Teleworking helps to improve the morale of the employees as they become confident since they are aware that the management is assured of their competence in their work and hence can allow them to work from home with minimum supervision. In addition, these employees get to put more concentration in their work to ensure that management will not reverse this decision. By adopting teleworking, an organization is able to reduce its overheads (Kugelmass, 1995). This is because the organization will not have to acquire lot of office space to be occupied by its employees, additional office equipment and furniture to be used by these employees. Teleworking is a very good tool for an organization to achieve employee retention as well as a great recruitment tool. The organization can be able to retain its best employees by allowing them to work from home. It could also attract new employees by offering them that they could work from home (Leonhard, 1995). b). The implications of teleworking from the perspective of the potential teleworkers for the organization Employees are able to benefit from teleworking as they are able to achieve a work and family balance more easily. By working from home, employees are able attend to the matters of their families easily since they are close to their families yet they are also attending to their work. In addition, teleworking helps employees to better manage work related stress as they are able to save lots of time that they could have used on commuting to and from work (Nilles, 1998). They also have lost of time that they could use to do the various things that want to do but lack the time. It is beneficial to employees as they are able to save on their expenses as they do not have to use money for transport, parking space fees, and new clothes every time so as to look good while at the office (Nilles, 1998). They also do not have use a lot of money eating out. This is important as it helps them to have better health as they do not have to eat fast foods that increase the risk of getting life style related health problems such as diabetes, obesity and cancer.                                c). The actions that management could take to minimize problems associated with teleworking Management should conduct extensive research so as to ensure that implementing the teleworking decision. It should come up with policies that will enable the information technology personnel is in a position to anticipate the needs of the teleworking employees. It is important that management considers the impact that teleworking will cause the organization in terms of the expected operational efficiency that it wants to achieve. It should come up with well planned policies that will set out reporting guidelines, the delivery schedules that will be used by the teleworking employees (Leonhard, 1995). Management should also set out the employee performance assessment criterion that will be used to asses any work that is done by the teleworking employees and how many hours that these employees will be expected to work. It is of great importance that there are clear lines of communication between telecommuting workers and their supervisors at the organization so that any problem that arises is addresses adequately( Leonhard, 1995). Management also needs to come up with the right procedures to follow to choose those employees that will take up the teleworking option that it hopes to introduce since not any employee can work well with minimum supervision. These employees need to be self disciplined, and poses excellent problem solving and communication skills (Nilles, 1998). Bibliography Public Safety Canada, 2001, A guide to business continuity planning. Retrieved on 23rd May 23, 2010, from Beth, M. et al, 2007, CMMI, 2nd Edition: Guidelines for Process Integration and Product Improvement, Pearson Education, Inc. London. Bray, L., 1999, "Consider the Alternatives." Association Management. McGraw Hill, Sydney. Kugelmass, J., 1995, Telecommuting: A Manager's Guide to Flexible Work Arrangements. Lexington Books, London. Leonhard, W., 1995, The Underground Guide to Telecommuting, Addison-Wesley, New York. Nilles, J. M., 1998, Managing Telework: Options for Managing the Virtual Workforce, John Wiley & Sons, New York. Raja, K. & Rodolfo, G., 1997, Disaster recovery, Vol 10, (3) Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Strategic Information Systems - TickIT and CMMI Case Study Example | Topics and Well Written Essays - 2750 words, n.d.)
Strategic Information Systems - TickIT and CMMI Case Study Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/information-technology/2033572-strategic-information-systems
(Strategic Information Systems - TickIT and CMMI Case Study Example | Topics and Well Written Essays - 2750 Words)
Strategic Information Systems - TickIT and CMMI Case Study Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/information-technology/2033572-strategic-information-systems.
“Strategic Information Systems - TickIT and CMMI Case Study Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/information-technology/2033572-strategic-information-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Strategic Information Systems - TickIT and CMMI

Brand management Hoyts Cinema

The firm that is analyzed in the paper is the Hoyts cinema, a branch of the Australian large company Hoyts Group that owns a display exhibition in an estimated 42 Australian prime cinema holdings placing it at the second spot in the cinema dominating industries in Australia.... .... ... ... This essay discusses that branding adds more value to the product that an organization offers making it popular among the less informed individuals in the society....
4 Pages (1000 words) Essay

Job Search Assignment

During the international exposure and business acceleration period the firm innovatively developed Employee Stock Options Program (ESOP) and acquired ISO 9001/tickit Certification and then, the organisation was promoted to a public limited company with larger segments of market capital....
4 Pages (1000 words) Essay

Marketing Environment of Walt Disney Holidays

Marketing Environment- Walt Disney Holidays Name: Institution: Course: Tutor: Date: Introduction Marketing management as a discipline calls for the practical management of firm's marketing resources and activities by applying optimum marketing techniques; influenced by the firm's size, corporate culture and the industry that the firm is in....
11 Pages (2750 words) Essay

The Impact of Social Media and Viral Marketing on the Film Industry

nteraction or exchange of the user generated information or content take place in virtual communities through social networks such as ‘facebook' and ‘twitter' using an internet for communication is called social media.... Impact of Social Media and Viral Marketing on the Film Industry....
9 Pages (2250 words) Essay

Infosys Limited

This was followed by the growth of service providers for customized software development, data processing, installation, systems integration, training, and maintenance.... (ITL) in the background of the information technology industry, its goals/objectives, strategies, key success factors, and critical issues along with recommendations.... During the latter half of the twentieth century, information and communication technologies (ICT) changed the character of national economies and human lives in an unprecedented manner....
6 Pages (1500 words) Case Study

Batch Chemical Reactor as a Plant Unit

The paper 'Batch Chemical Reactor as a Plant Unit' looks at a batch reactor, which is widely used in the chemical and process industry to perform several operations such as providing an environment of chemical reactions, crystallization, product mixing, dissolution of solids, polymerization.... ... ...
22 Pages (5500 words) Research Proposal

Ghana International Airlines

The "Assessment of Airline Service Quality through Performance Excellence Framework and its Effect on Profitability" examines the service quality performance of Ghana International Airlines and determines factors relating to a performance that may have contributed to the company's eventual failure....
73 Pages (18250 words) Dissertation

Analyzing Managerial Decisions

The majority of the work is to develop dedicated systems for SMEs.... The majority of the work is to develop dedicated systems for SMEs.... .... ... ... QUESTION ONE You have just been appointed as manager to a small software house, which has expanded considerably over the last two years and now employs 30 staff....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us