Preview

Risk Management in Oracle Upgrade

Powerful Essays
Open Document
Open Document
1915 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management in Oracle Upgrade
Abstract
With the internet accelerating the sharing and collecting of information of all types, concerns about the accuracy and protection of the collected data have grown drastically. In this document an attempt will be made to describe risks will be managed during the process of "Upgrading the existing Oracle Financials ERP implementation to 11.5.10 version". This document defines roles and responsibilities for participants in the risk processes, the risk management activities that will be carried out, the schedule and budget for risk management activities, and any tools and techniques that will be used. Introduction
The risk management process attempts to identify what could prevent or limit the upgrade of the existing oracle applications (11.5.9) and achieve the targeted functional and performance objectives within cost and schedule constraints. This is a very essential component of delivering the upgrade project, and any other project, to the altar of success. The competition among the software vendors drives them to deliver the new versions to their customers without thorough testing and fixing the loop holes in their product. In addition, every new version calls for stronger hardware requirement, more skilled and trained individuals, more clarity in the expectations from the software/upgrade, and faster implementation and/or upgrade – because the obsolescence of software takes place before the new version is released. Therefore, the planning of an upgrade process of any software needs to be planned very careful. Risk Classification
An applications upgrade delivers the organization a tool which acts as a catalyst for business change, by delivering – new functionalities, better performance, new applications, etc. The effective migration/upgrade of the application ensures that the management enjoys the fruit of the efforts put/invested in this project. Thus it is the responsibility of the project team to ensure that all the risks are mitigated

You May Also Find These Documents Helpful

  • Good Essays

    6. risk management related to accounting standards and reporting for international, government or nonprofit entities…

    • 345 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 7 Essay

    • 301 Words
    • 2 Pages

    Another reason for keeping a computer operating system updated is to provide increased productivity. When a software program evolves from one version to another, it becomes more streamlined, user-friendly, and increases intuitive to put to work. A major part of a business expenses are the employees and having upgraded software are synonymous with investing in employee productivity. As companies grow, hardware and software must grow with them to face increasing demands of productivity (Garger & Kosur, 2010). Outdated software is also much more expensive to maintain than the newer versions, by overloading help desk personnel with software related…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * the company will have no need to do any changes of current information into new application software * there is no extra cost to implement new software * Staff is not required to learn new software applications * Employees will be happy with the current functional application software which they are very familiar with.…

    • 493 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Risky Situations

    • 2619 Words
    • 11 Pages

    Grabski , S. V., Leech, S. A., & Lu, B. (n.d.). Risks and controls in the implementation of erp systems. The International Journal of Digital Accounting Research, 1(1), 47-68. Retrieved from http://www.uhu.es/ijdar/10.4192/1577-8517-v1_3.pdf…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Baum, David and others. “Oracle 25 Years of Technology Innovation.” Oracle Magazine, November/December, 2001, pp. 65-82.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Powerful Essays

    Stoneburner, G., Goguen, A., and Feringa, A. (2002). "Risk Management Guide for Information Technology Systems." NIST.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    • Software updates will be ongoing during the project, so the installation of software on the destination servers will be done once that version of the…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    D2 Evaluate the risks involved in the installation or upgrade of software and explain how the risks could be minimised.…

    • 325 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Assessment

    • 1788 Words
    • 8 Pages

    Almost every company in business is face with some risk or potential threat that could cause a huge blow to their organization operations. These risks and threats usually comes from within or outside and organization. In order to prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risk so they could protect themselves from the harm caused by them. Risks involve theoretical effectiveness of security measures, loss of impact, threats and vulnerabilities that are common in today's society.…

    • 1788 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The section also briefly describes impact, assessment and counter measures or contingencies which may reduce the likelihood and/or cushion the impact.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Many businesses are concerned with information technology risks. Many organizations are concerned with different types of risk and attempt to control risk as they are assessed. In order to control risk, organizations must create control environments that set the tone of employee awareness and promote operational efficiency. One attempt to control risk is through risk assessment. The purpose of risk assessment is to identify organizational risks and evaluate additional or specific control procedures. The purpose of this paper is to analyze and assess the risks within the flow charts of accounts payable, accounts receivable, inventory, and payroll recommended by learning team E for Kudler Fine Foods, design internal controls to mitigate risks to the system, evaluate the application of internal controls to the system and discuss other controls outside the system that Kudler Foods may need.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays