Preview

Risk Management in Oracle Upgrade

Powerful Essays
Open Document
Open Document
1915 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management in Oracle Upgrade
Abstract
With the internet accelerating the sharing and collecting of information of all types, concerns about the accuracy and protection of the collected data have grown drastically. In this document an attempt will be made to describe risks will be managed during the process of "Upgrading the existing Oracle Financials ERP implementation to 11.5.10 version". This document defines roles and responsibilities for participants in the risk processes, the risk management activities that will be carried out, the schedule and budget for risk management activities, and any tools and techniques that will be used. Introduction
The risk management process attempts to identify what could prevent or limit the upgrade of the existing oracle applications (11.5.9) and achieve the targeted functional and performance objectives within cost and schedule constraints. This is a very essential component of delivering the upgrade project, and any other project, to the altar of success. The competition among the software vendors drives them to deliver the new versions to their customers without thorough testing and fixing the loop holes in their product. In addition, every new version calls for stronger hardware requirement, more skilled and trained individuals, more clarity in the expectations from the software/upgrade, and faster implementation and/or upgrade – because the obsolescence of software takes place before the new version is released. Therefore, the planning of an upgrade process of any software needs to be planned very careful. Risk Classification
An applications upgrade delivers the organization a tool which acts as a catalyst for business change, by delivering – new functionalities, better performance, new applications, etc. The effective migration/upgrade of the application ensures that the management enjoys the fruit of the efforts put/invested in this project. Thus it is the responsibility of the project team to ensure that all the risks are mitigated

You May Also Find These Documents Helpful

  • Powerful Essays

    • Software updates will be ongoing during the project, so the installation of software on the destination servers will be done once that version of the…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The company is reengineering the company’s Intranet/Information systems and enterprise resource planning (ERP) system. The upper management has chosen to implement SAP to connect all aspects of the company; accounting, manufacturing, aircraft services, supply inventory, and customer resource management (CRM). Implementing this new information system (IS) will allow the different parts of the company to operate as one, by allowing the various modules in SAP to communicate and exchange data. SAP will replace all of the outdated and splintered software the company currently uses by allowing easier communication between the departments and the programs that are used. The change was started about three years ago and will be completed in about two years for a total of five years to complete and be fully implemented. Connecting all of the different departments will save a tremendous amount of money for the company. Reengineering the IS systems will allow the sales department and customer representatives more easy access to the customer’s information, such as current and future orders, current aircraft service status or new aircraft delivery time; thereby increasing the customers value and customer…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    References: Beard, Deborah & Wen (2007). Reducing the Threat Levels for Accounting Information Systems. The CPA Journal Online. Retrieved from http://www.nysscpa.org/cpajournal/2007/507/essentials/p34.htm…

    • 625 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this report I will talk about the decision you have to make before upgrading a software program and some advice so you won’t encounter any errors or difficulties!…

    • 958 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Brose Case Study

    • 470 Words
    • 2 Pages

    3. What would be the benefits and the risks of retaining the functional application software found in each Brose location prior to the move to SAP? [table]…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Make reference to the risk management plan in Section 3.6 of Corporate Risk Management .…

    • 406 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Baum, David and others. “Oracle 25 Years of Technology Innovation.” Oracle Magazine, November/December, 2001, pp. 65-82.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Better Essays

    Risky Situations

    • 2619 Words
    • 11 Pages

    Grabski , S. V., Leech, S. A., & Lu, B. (n.d.). Risks and controls in the implementation of erp systems. The International Journal of Digital Accounting Research, 1(1), 47-68. Retrieved from http://www.uhu.es/ijdar/10.4192/1577-8517-v1_3.pdf…

    • 2619 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Enterprise risk management (ERM) has become a critical practice in organizations that are dedicated to managing uncertainty and its effect on achieving organizational objectives. ERM helps organizations focus on the most relevant risks to achieving an organization’s goals and objectives, both from an operational, as well as a strategic, perspective. How much risk an organization assumes—either knowingly or unwittingly— plays a large part in whether that uncertain future outcome actually improves or worsens the organization’s position. It is therefore crucial for an organization to define and determine its Risk tolerance levels since it will help the organization make major decisions based on what has determined to be acceptable risk.…

    • 1635 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The section also briefly describes impact, assessment and counter measures or contingencies which may reduce the likelihood and/or cushion the impact.…

    • 740 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sherwin-Williams

    • 1443 Words
    • 6 Pages

    The Oracle system was so adapted it to Versions were deployed for Asian and for the Americas. Once the main foundation of your system was laden place the enterprise data management portion of the Oracle suite was implemented in 2008 which focused on a more centralized and coordinated approach in the areas of production vendors and customer data. This allow the company greater control when he came to its second phase of distribution. Further enhancement and centralized data hub allow the company to focus on the five key business…

    • 1443 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    When all data is gathered we will complete a risk assessment of the company so that the best audit approach may be…

    • 1183 Words
    • 5 Pages
    Better Essays