Friday, February 17, 2006

[IT][轉貼] ERP 導入失敗的十大原因

ERP 導入失敗的十大原因
有些公司導入 ERP 系統之後,並未獲得預期的成果,或者沒有充分利用購入的系統或功能模組來運作。因此常會有人提出這樣的問題:「有那些 ERP 系統導入成功的案例?」,會提出這樣的問題,表示企業 ERP 導入的失敗案例仍然是存在和難以避免的!
嚴格來說,所謂 「ERP 導入失敗」的定義很難有明確的規範。或許有人認為完全無法上線使用才叫失敗,但也有人認為比預期的效果存有巨大的差異,或者上線一年後高階主管和使用者的抱怨仍然不斷,也可歸類於不成功的導入。當然 要成功的導入ERP系統,一定要具備許多的條件。而失敗的因素可歸納成下列幾點:

一、選擇不適用的 ERP 系統
使用者在選擇 ERP 軟體系統之前,並沒有充分瞭解自己的需求,產業的特性,經營管理的方式(如依計劃生產、訂單生產或訂單裝配),以致於上線後發現系統無法套用到實際的作業上,最後迫使企業「削足適履」,再搭配人工作業方式勉強使用,或者再花一大筆錢作客製程式修改。日子久了,系統可能就荒廢不用或因花費過大而看不到投資效益。

二、企業願景規劃不當,使原來選擇的 ERP 系統不適用
企業在建置 ERP前,必須與全體員工共同描繪出企業的未來的願景,引導企業資源投入的方向,如此才不會因為局現於目前的企業規模或業務形態,而選擇一套不適用的 ERP 系統;或在建置時欠缺企業未來發展的考量,而建構出一個格局太小的基礎,萬一在導入後不久企業規模或業務形態產生重大變化,就像打好一個五樓公寓的地基,突然決定要蓋十層的大樓般,剛花下大把銀子和精神建置完成的 ERP 系統,可能又要面臨更換的窘境(詳見---企業願景規劃策略一文)。

三、輔導訓練課程成效不彰
由於系統的使用者和高階主管在購買 ERP 系統或導入前,並沒有接受充分的 ERP 教育訓練,或顧問師的輔導能力不足,結果當然是瞎子摸象般難以一窺全貌,只知其然而不知其所以然,只瞭解局部的模組功能,而缺乏對整合系統的完整認識。

四、使用者抗拒新的系統
人的本性容易因習慣而排斥新的事務。舊的系統行之有年已經非常熟練,如資料欄位,報表格式都很清楚,一旦啟用新的 ERP 系統又要重新摸索學習,主觀上先認定新系統沒有舊的好,心態上難免有所抗拒。

五、高階主管不支持,口惠而實不惠
除了高科技產業外,許多傳統產業的高階主管可能連基本電腦知識都嫌不足,更何況是複雜龐大的 ERP 系統,姿態上又做不到“不恥下問”,也不是每天作業的操作者。因此認為只要批准購買 ERP 系統就是行動上的支持,最多口頭上再作宣示上的支持。事實上,在導入 ERP 系統時,有許多公司的作業流程也許要改變,部門組織的權責也許要重新定義,這些都需要高階主管的親身參與。

六、企業指派的專案經理人不適任
大部份的企業主(特別是中小企業主)誤認為導入 ERP 是資訊部門的職責,而指派 MIS 人員充當 ERP 導入的專案經理人,在缺乏產業背景的歷練,又沒有獲得營運和製造部門的充分支援下,很難製定出一套符合商業利益的專案計劃。

七、基礎建置及日常輸入的資料不正確
就像建構一棟大樓般,基礎資料的建置決定了將來系統運作順暢與成敗,其中又以成品和原物料的編碼影響最大,等上線後發現問題百出窒礙難行時,可能得浪費幾個月的時間重新來過。其次,在上線後如果系統輸入資料不正確,例如物料帳不準,品號引用錯誤,用料表(BOM)錯讓,工程設計變更(ECN)沒有及時維護,訂單輸入數量單價錯誤…等,都會造成電腦計算結果的錯誤,誠如一句資訊的名言:「垃圾進,垃圾出」,使用者一旦對 ERP 系統輸出的資料缺乏信心,ERP系統的成效就大打折扣。

八、ERP 系統執行的速度太慢
ERP 系統的速度過慢有很多原因,列舉五項如下:
1. 通訊頻寬過窄   這是目前兩岸三地的系統最大的罩門,也是最難解決的大難題,因為現在普遍使用的 ADSL 專線,頻寬只有 512K,,如果不是走 N-TIER 架構,系統的速度只能以“苦撐待變”來形容。所幸最近多家 ISP 推出 MPLS VPN 虛擬網路,如果大陸工廠不是設有太過偏遠的地區,這個問題可以有效改善。
2. CLIENT / SERVER v.s. N-TIER   這是 ERP 系統架構的問題,如果不幸選到老掉牙、非 N-TIER 的系統,那才叫欲哭無淚。所幸現在的系統大都已經採用 N-TIER,但使用者在評選時最好問個清楚。
3. USER 使用者過多   大企業可能有100 - 200 台 PC,中小企業可能只有 10 - 20 台 PC,所以不同的 User 環境就要有不同的網路配置和系統架構,否則系統速度也不會牛步得讓人受不了。
4. DATABASE 沒有建立索引檔   雖然說過去 .DBF 需要建立索引檔,現代的關聯式資料庫如 ORACLE 應當會自動以最佳化方式搜尋,但是電腦還是不敵人腦,建立正確的索引檔,能使系統過帳速度增加數十倍以上,反之就是報表速度牛步化的開始
5. DATABASE 的 SQL 語法沒有 TUNING   就算是煮菜也有分大師和二師,寫程式當然也有老手和新手,老手下每一個 JOIN SQL 命令一定反覆 TUNING,深怕增加客戶一秒鐘等待時間,這是一種職業道德,很多系統會慢這也是一大原因。

九、公司策略和作業流程不變
許多公司使用新的 ERP 系統,但仍沿用過去的策略和作業流程來管理,就像新瓶裝舊酒般,無法真正發揮企業資源的重新規劃和運用。在導入 ERP 系統之前宜對原有的流程再檢視評估,並予以簡化和標準化,再以明確的作業標準書(SOP)規劃每一個職務,如此才可能發揮新系統的優點。

十、缺乏定期的績效評估
導入 ERP 系統之後,對於企業的營運是否產生正面的效益,應該經常加以評估,例如成本結算時間是否縮短?存貨是否下降?準時交貨率是否提高?生產排程的達成率是否提高…。只有透過定期如每月的績效評估,才能對症下葯適時改善。
企業在導入 ERP 系統時,若能設法去除上述失敗的十大因素,成功的機率就會大幅的提昇!

Sunday, February 12, 2006

曹操的短歌行

對酒當歌,人生幾何?譬如朝露,去日苦多。

慨當以慷,憂思難忘。何以解憂,唯有杜康。

青青子衿,悠悠我心。但為君故,沈吟至今。

呦呦鹿鳴,食野之苹。我有嘉賓,鼓瑟吹笙。

明明如月,何時可掇?憂從中來,不可斷絕。

越陌度阡,枉用相存。契闊談讌,心念舊恩。

月明星稀,烏鵲南飛。繞樹三匝,何枝可依?

山不厭高,海不厭深。周公吐哺,天下歸心。



轉自
http://www.ylib.com/class/topic3/show2.asp?No=140438&Object=2000&TopNo=46683

[老子道德經]第十七章

[老子道德經]第十七章

太上,不知有之;
其次,親而譽之;
其次,畏之;
其次,侮之;
信不足焉,有不信焉。
悠兮其貴言。
功成、事遂,
百姓皆謂:我自然。

白話譯文:
最上乘的國君治理天下,使得人們不覺得有他的存在;
其次者,使得人們來親近他、贊譽他。
再其次者,使得人們畏懼他;
又其次者,使得人們回過頭來侮辱他;
統治者的誠信不足,老百姓們也就無法相信你。
悠悠然地行事吧!不要輕易的發號施令。
成功了,完事了,老百姓們說:我們原來就自自然然的這樣了

Wednesday, February 08, 2006

BS7799 簡介

BS7799 簡介
BS7799 - 國際資訊安全稽核規範,全名是 BS7799 Code of Practice for Information Security,由英國標準協會 British Standards Institution 在 1995 年提出、修訂,為目前國際上最知名的安全規範,而且已被 ISO (International Organization for Standardization) 接納成為國際標準。

BS7799 內容大致上分成兩個部分:
  • The code of practice for information security systems: 設立了產業最佳的管理資訊安全準則
  • Specification for Information Security Management Systems - ISMS」: 詳述 IT 安全應用與稽核所應遵循的架構,包含 10 個章節與 10 個控管重點,它可以來設置應用的時程,並以 10 個控管重點來保證目標的達成。


BS7799 包含了所有企業安全政策,從安全政策的擬定、安全責任的歸屬、風險的評估、到定義與強化安全參數及存取控制、防毒策略。 根據 BS7799 標準的風險評估包括了兩項系統化的考量:


1. IT 安全的破壞造成可能的資訊保密性、真確性與可用性失效之後果,將會導致對企業的傷害。

2. 對各種威脅的防範與合理的控管都會影響這些破壞發生的實際可能性。
BS7799 是一套相當複雜的資訊安全應用與稽核的標準,但不外乎就是控管(Control)的觀念。定義一套完整的政策、程序、實施與組織化的架構,用來提供合理的保障使企業目標得以達成,並避免、偵測或修正無法預期事件所造成的後果。

BS7799 的 10 個章節中內容介紹如下:
1. Security Policy「安全政策」的目標在於提供管理的方向來保障資訊安全。


2. Security Organization「安全組織」的目標包括a.企業內資訊安全的管理b.維持處理組織安全的相關設施與資訊資產由一個可靠的第三單位所控管c.維持當資訊處理程序外包(outsourced)給其他組織時的安全


3. 加上防止侵入程式妥善配置防禦軟件,可敏捷地確認攻擊模式,然後在警號響起之時,立即抵禦黑客。


4. Assets Classification and Control「資產分類與控制」是為了維持對企業資產適當的保護及確保資訊資產可得到一個相當程度的保障。


5. Personnal Security「人員安全」為了要降低人為錯誤、竊取、欺騙、及濫用相關設施的風險,來確保使用者意識到資訊安全的威脅;為了確保在正常工作程序中資訊的安全與降低安全意外事件的損害並從其中習得相關經驗。


6. Physical and Environmental Security「實體與環境安全」主要是為了避免未授權之存取、破壞與影響企業的建築或資訊;避免損失、或對資產的破壞與阻礙企業活動的進行;避免對資訊及其處理設施的破壞或竊取。


7. Computer and Network Management「電腦與網路管理」要達成a.確保正確與安全資訊處理設備之運作b.把系統的失誤降到最低c.保護軟體和資訊的真確性d.維持資訊處理與通訊的正確性與可用性e.確保資訊在網路上的保全與保護支援的基礎建設f.避免對資產的損害與中斷企業活動g.避免資訊在組織間傳遞時的中斷、竄改與誤用。


8. System Access Control「系統存取控制」要達成a.資訊存取控制b.避免資訊系統未授權之存取c.網路服務的保護d.避免電腦未授權之存取e.偵測未授權之活動f.確保行動運算與電信網路設施的安全。


9. Systems Development and Maintenance「系統開發與維護」要做到a.確保安全被內建在運作的系統中b.避免使用者資料在應用系統中被中斷、竄改與誤用c.保護資訊的授權、機密性與真確性d.確保所有的 IT 專案與相關支援活動都在安全的考量下進行e.維護應用系統軟體與資料的安全


10. Business Continuity Planning「企業持續運作規劃」要降低對企業活動的阻礙與防止關鍵企業活動受到嚴重故障或災害的影響。


11. Compliance「遵行」則是要a.避免違反民、刑事法律、規範、或任何安全要求契約上的義務b.確保系統運作遵循組織的安全政策與標準c.把系統稽核過程之效能極大化與影響最小化。


BS7799 資訊安全應用規範的 10 大 Control 重點:
1. Information security policy document:資訊安全政策文件化
2. Allocation of information security responsibilities :資訊安全的責任歸屬
3. Information Security Education & Training:資訊安全的教育訓練
4. Reporting of Security Incidents:安全事件的通報機制
5. Virus Controls:病毒的控制
6. Business Continuity Planning Process:企業持續規劃的程序
7. Control of proprietary software copying:軟體複製的管制
8. Safeguarding of organizational records:組織相關紀錄的防護
9. Data Protection:資料保護
10. Compliance with security policy:資訊安全政策的遵循


資訊安全是一股不可違逆的潮流,對組織或企業來說,必須衡量自身承受安全的風險與成本之平衡,訂定出一套符合本身需求的「安全政策」。

Monday, February 06, 2006

[CISSP] Domain Security Management Practices

Domain Security Management Practices

The main goal of risk analysis

  • Identify risks
  • Quantify the impact of potential threats
  • Provide an economic balance between the impact of the risk
  • The cost of the safeguards

Security Policy
is a general statement produced by senior management.

Common development process of security policy

  • Intial and evaluation
  • Publication
  • Development
  • Implementation

Standard
specify how hardware and software products are to be used

Baselines
provide the minimum level of security necessary throughout the organization.

Guideline
are recommended actions and operational guides to users, IT staff, operations staff, and others when a specific satandard does not apply.

Procedure
are detailed step-by-step tasks that should be performed to achieve a certain goal.

Policies detail what should be done, and the standards detail how.

Due dilligence is the act of investigating and understanding the risks the company faces.

Due care by developing security policies, procedures, and standards.

Risk Analysis Definition

Exposure factor(EF) Percentage of asset loss caused by identified threat

Single loss expectancy(SLE) Asset value x exposure factor

Annualized rate of occurrence(ARO) Estimated frequency a threat will occur within a year

Annualized loss expectancy(ALE) Single loss expectancy x annualized rate of occurrence

Total Risk = Threats x vulnerability x asset value

Residual Risk = (Threats x vulnerability x asset value) x control gap

Value of safeguard to the company = (ALE before implementing safeguard) - (ALE after implementing safeguard) -(annual cost of safeguard)

The modified Delphi method is for brainstorming and consensus Delphi mehtod is for problems solving.

ISO 17799 is the internationally recognized Information Security Management Standard that provides high-level, conceptual recommendations on enterprise security. It was derived from BS 7799.

ISO 17799 /BS 7799 10 sections

  • Scope
  • Information security policy
  • Security organisation
  • Asset classification and control
  • Personnel security
  • Physical and environmental security
  • Communications and operations management
  • Access control
  • Systems development and maintenance
  • Business Continuity management

Risk analysis steps

  • Idendify assets and their values
  • Identify vulnerabilites and threats
  • Quantify the probability and business impact of these potential threats
  • Provide economical countermeasure recommendations
  • Access control System development and maintenance
  • Business continuity management
  • Compliance

Security analyst is helping the company at a strategic level by developing policies and their supporting mechanisms.

Cost/benefits analysis is the most valuable technique when determining if a specific security control shuld be implementd.

Qualitative would be a subjective observation, while a quantitative approach defines statistical costs associated with a threat.

Health care information are considered sensitive but unclasified information(?)

Threat is a event or activity with potential to cause harm to information systems or networks.

Vulnerability is a system weakness that can be exploiterd by a threat.

Example: Your company has hired a risk management firm to evaluate the organization's overall health and risks. One area that is quickly identified is a small warehouse in a heavily populated area which holds valuable assets. The warehouse has no preimeter defenses. The lack of protection would be characterized as a vulnerability.

Exposure factor is a measure of the magnitude of loss or impact on the value of an asset.

Eaxmple: Cary is working on a risk management project and must determine the degree of damage to a manufacturing facility downtown in the event of a flood. This degree of damage is referred to as exposure factor.

A threat is that a threat agent will exploit a vulnerablilty. The probability of this happening is the risk. Once the vulnerability is exploited there is an exposure.

"Shoulder surfing" is an example of confidentiality security failure.

Example: Recording screen shots of another user's computer with a video recorder.

Business continutiy and disaster recovery fall under compensating security control.

Controls and resources can be put into place to mitigate identified business risks which can return on investment pertaining to the implementation of controls.

When an activity is carried out, either intentionally or accidentally, and it disrupts a computer, it can be referred to as a compromise.

Auditing logs should capture unique user identification information to be able to enforce true individual accountability.

Regulartory policy

is written to ensure that the organiztion is following standard set by a specific industry and is regulated by law. The policy type is detailed in nature and specific to a type of industry. This is used in financial institutions, health care facilities, and public utilities.

Advisory policy

is written to strongly suggest certain types of behaviors and activities which should take place within the organization. It also outlines possible ramifications for noncompliance activities to employees. This is used for handling medical information, financial transactions, and processing confidential information.

Informative policy

is written to inform employees of certain topics. It is not an enforceable policy, but one to teach individuals about specific issues relevant to the company. It could explain how the company interacts with partners, the company's goals and mission, and general reporting structure in different situations.

[CISSP] Domain Application and System Development Security

Domain Application and System Development Security

Polyinstantiation is a feature of object-oriented programming that prevents or discourages subjects at a given level from accessing higher sensitivity information.

Polymorphism allows similar data to be processed based on the clearance of the user and the class the object belongs to. Polymorphism is when different objects respond to the same command, input, or message in different ways.

Polyinstantiation a mechanism used to take a copy of an object and repopulate it with different data or modify its characteristics in some way.

Rows in a database are referred to as tuples. Columns are attributes, and a collection of related data items are called a record.

Validation ensures that the product satisfies the real-world problem it was developed to accommodate and that actual performance and outputs are accurate.

Verification evaluates the product's performance to the acclaimed functionalities and protection levels. It also compares the specifications of the product to that actual resulting product.

Aggregation is the act of reviewing information at or below their security clearance and then deducing information that resides at a hinger level that they are not authorized to know.

The goal of data or information hiding in object-oriented programming is to prevent one component from needing to know how another component functions, as long as it performs the required task.

A reference monitor is the abstract machine that holds all of the rules of access for the system. The security kernel is the active entity that enforces the reference monitor's rules. They control the access attempts of any and all subjects; a user is just one example of a subject.

Need-to-know does not allow subjects to access objects unless they have beend granted formal approval, which is based on a need to know.

Capability Maturity Model



  • Initial
  • Repeatable
  • Defined
  • Managed
  • Optimizing

The number of rows in the relation is referred to as the cardinality and the number of columns is the degree.

Datamarts

are colection of data from different databases or system that fulfill a specific need.

Data warehouses

are a collection of data from different databases or systems that could cover a wide variety of objectives.

Data mining

is also known as Knowledge Discovery in Database(KDD), which are techniques of identifying valid and useful patterns.

  • Classification-Data is grouped together according to shared similarities
  • Probabilistic-Data interdependencise are identified and probabilities are applied to their relationships
  • Statistical- Identifies relationships between data elements and uses rule discovery

Saturday, February 04, 2006

[CISSP] Domain Law, investigation, and Ethics

Domain Law, investigation, and Ethics

Trademarks are legal rights to logos, names or packaging that offer a distinguishing identity for a company.

Copyright protects the right of an author to control the public distribution, reproduction, display, and adaptation of his original work.

Patents protect ideas and inventions

Evidence life cycle


  • Collection and identification
  • Analysis
  • Storage
  • Presentation
  • Return to owner

(ISC)2 demands that its members follow four main canons of ethics

  • Protect society, the commonwealth, and the infrastructure
  • Act honorably, honestly, justly, responsibly, and legally.
  • Provide diligents and competent service to principals.
  • Advance and protect the profession

Steps of computer intrusion is identified

Detect, evaluate notify, contain, eradicate

Data diddling is altering data before it goes into a system or as soon as it comes out.

The Health Insurance Portability adn Accountability Act(HIPPA-> kennedy-Kassebaum Act)

is a new federal regulation, which has been mandated to provide national standards and procedures for the storage, use, and transmission of personal medical information and healthcare data.

According to the Code of Ethics by (ISC)2 conflicts should be resolved in

Duty to public safety, principles, individuals, and profession