Reference no: EM132430486
Case Study
You work for a small business with eight staff members. Here is the employee breakdown of the business:
Two business partners, who own the business
Three administration staff
One finance manager
Two sales staff, who mostly work remotely
The business has started to grow. The projection is that, over the next 12 months, there will be an additional three staff members employed, one of whom will be another member for the sales team.
It has been found that the computer network is not adequate. You have been appointed as Project Manager to manage the purchase and implementation of a new computer network. It has been decided that all computer equipment will be replaced. You have been given a total project budget of $100,000.
You will need to coordinate the implementation to ensure that there is no interruption to the normal day to day operations of the business.
Task 1: As part of your initial assessment of this project, project scope plan. Attached is a project scope plan template to use. Alternatively, you can use the procedure template from your workplace.
Task 2: Put together a list of any questions that will enable you to clarify the project parameters, e.g. scope, time, costs, quality, resourcing, risks, legislation, procurement, and reporting.
Task 3: Provide an organisational/project structure chart, including all stakeholders and the lines of authority.
Identify your own responsibilities, lines of reporting, and a plan including a timeline on how you will undertake consultation and communicate with relevant stakeholders to generate input and engagement in planning, implementing, and reviewing the project.
What kind of information was compromised
: Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation.
|
Explain the steps to managing a project
: Explain the steps to managing a project using a traditional methodology.
|
Determine are such concerns justified in your view
: Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were.
|
Scenario for a hypothetical oltp business system
: Suggest a scenario for a hypothetical OLTP business system where optimistic concurrency control is most appropriate and another scenario
|
How you will undertake consultation and communicate
: Identify your own responsibilities, lines of reporting, and a plan including a timeline on how you will undertake consultation and communicate with relevant
|
Explain the benefits and the vulnerabilities
: Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.
|
Success factors for managing multicultural teams
: Discuss, analyse and evaluate the strategies and success factors for managing multicultural teams, both onsite and virtual, giving due consideration
|
What are typical phases of operation of a virus or worm
: What are typical phases of operation of a virus or worm? What is the difference between machine-executable and macro viruses?
|
Discuss pert-cpm and gantt
: What are the purposes of each tool and circumstances for using each tool? Also consider whether these tools can be used independently
|