IFN711 Industry Project Plan Assignment

Assignment Help Computer Network Security
Reference no: EM132476975

IFN711 - Industry Project Plan - Queensland University of Technology

Learning Objective 1: Select and apply the appropriate project management approach to design and deliver a sophisticated IT system within a team environment

Learning Objective 2: Demonstrate project management skills including Estimation, planning, execution, monitoring & closing for a group IS/IT project

Learning Objective 3: Demonstrate professional skills and ethical conductThe Project Plan (PP)is a critical Project Management (PM) deliverable that will help you and your team's project's success. You and your team must work towards a high-quality PP. The PP is an assessable item and you will receive feedback. Please refer to the attached Marking Guide (see Appendix A) and ensure that the submitted plan covers all assessed criteria elements.

Your team will need to deliver IT artefacts that will address a specific company's requirements or an industry wide problem. The main outcome of the project is the development of an artefact, which must be communicated explicitly in your plan. In the industry-oriented projects, students are expected to plan and execute a set of activities to deliver an IT artefact. This is normally in the form of;

Part a) creating a new application or service or

Part b) modifying an existing app or service (e.g. an application, or a framework, or a tool, etc.) or

Part c) experiment and discuss the results of emerging technology for addressing a business need.

Your project assessment outcomes will need to be informed by the knowledge gained in your MIT units (using either research literature, industry-based case studies, white papers or advanced units' knowledge)so that your team can justify your choices. This will be a key consideration in the assessment to substantiate your design, development and implementation choices and validate your project outcomes.

Requirements for the Project Plan

While each project will be unique, your Project Plan should include the following elements as a minimum. You should discuss other items for inclusion with the project's supervisor (tutor).In section 3 your team will need to choose an appropriate Project Management (PM) approach for your industry project. You will justify your choice in this document. Once you have chosen a PM approach you must use the appropriate techniques related to that PM approach. In section 5 we have specified a WBS and Gantt chart technique in addition to the appropriate technique for your PM approach. The WBS is a well-established technique to track activity-based contributions assigned to each member of the team. These techniques will provide you with the data for subsequent assessments namely Individual journals and peer assessment components of the final report.

The purpose of this project is to expose you to real life event logs and analyse the data using different process mining techniques and tools. The questions asked in this project are of interest to industry. The event log provided to you as a part of this project pertains to a large multinational company operating from the Netherlands in the area of coatings and paints. In the dataset each purchase order contains one or more line items.

PART A: DISCO Analysis
You are to use the event log ‘Project_Log.xes' for Part A. The data set contains 251,734cases and 1595923 events. Answer the following questions using the DISCO Tool. For each question, start from the original log (unless specified otherwise).

Process discovery
1. Compare and contrast two process models (maps)- one generated using the setting: 100% activity and 100% paths and the other generated using the setting 100% activity and 50% paths.
2. Investigate the case variants detected from the log. Overall, how many case variants are present in the log? Report on the top ten (10) most frequent case variants and their respective frequencies. How much of the log do these ten (10) case variants cover? Explain the implications of a high number of case variants when you try to generate a representative process model.

Performance analysis
3. Filter the log to include cases of any two item catetgories (3-way with GR-based invoicing, 3-way without, 2-way, consignment).
Using the resulting filtered log answer the following questions:
(a) Where are the bottlenecks (the longest mean waiting times) in the process?
(b) How many cases are completed within two weeks?
(c) What is the spend area text in cases that finish within a week?

Process comparison
4. Compare process behaviour and process performance of two groups of cases of your choice. Please provide a reasoning for the selection of two groups.Describe your observations.

Filtering
5. Apply any three relevant filters sequentially to the original log. Please explain which filters you appied and why. Show the overview screen with the statistics of the filtered log.
Using the resulting event log answer the questions:
(a) How many cases are there in the log?
(b) What is their mean duration?
(c) Explain the process behaviour.

Improvement recommendations
6. Based on the insights gained from analysing the process in Disco, please provide two process improvement recommendations for compliance and provide justification for your recommendations using the analysis results (including screenshots).

PART B: Process Mining with ProM

You are to use the event log ‘Project_Log.xes' for Part B as well. Answer the following questions using different plug-ins available in ProMLite.For each question, start from the original log (unless specified otherwise).

Process Discovery
1. Mine the log with Alpha, Heuristics and Inductive Miner algorithms. Show the screenshots of these models. Discuss the models in terms of the notation used, the constructs present in the mined model and compare the similarities and differences between these models.

Process Conformance
2. Replay the log on the process models you discovered from Alpha and Inductive Miners.
(1) Do these models completely fit the log? If not, how many instances fit these models and how many do not?
(2) Where are the problems for the non-fitting process instances?
(3) Discuss how well these models describe the process behaviour seen in the log by making use of the trace fitnessmetrics.

Performance Analysis

3. Conduct the dotted chart analysis using the ‘Analyze using Dotted Chart' plug-in to analyse the throughput times of cases. Discuss the insights gained from the analysis.

4. Identify the bottlenecks in the system using ‘Replay a log on Petri Net for Performance/Conformance' plug-in. Please make use of the discovered model from the Inductive Miner algorithm.

Improvement Recommendations
Q5. Based on the insights gained from utilising various process mining techniques, please provide twoprocess improvement recommendations for compliance and provide justification for your recommendations using the analysis results (including screenshots).

PART C: Overall Process Mining Analysis

The organisation that has provided this data has indicated questions regarding compliance of purchase orders. In this part of the project you are expected to use DISCO, ProM, and a third process mining tool (such as Celonis) to provide answers to the following questions.

Q1. Based on derivation of different process models please describe the overall purchase order process of the organisation.

Q2. Which category of purchase documents take maximum time and why?

Q3. What are the main deviations in the purchase order of different item categories?

Q4. What are the main bottlenecks in the entire purchase order process?

Attachment:- Process Mining Project.rar

Reference no: EM132476975

Questions Cloud

Health care reform policy alternative : Journal entry, recommend a health care reform policy alternative to positively impact insurance coverage and financing the delivery of healthcare
Quality measurement proposal : For this assignment, you are required to write a 1,000-1,250 word paper on methods of quality measurement.
CPCCBC4004A Identify and produce estimated cost : CPCCBC4004A Identify and produce estimated costs for building and construction projects Assignment help and solution - Unity school of education
Investigate the companys existing supply chain strategy : Investigate the companys existing supply chain strategy and, considering the key challenges and recent changes demonstrated in the Case Study and associated
IFN711 Industry Project Plan Assignment : IFN711 Industry Project Plan Assignment help and solution, Queensland University of Technology - assessment writing service - Demonstrate project management
Record the transactions for June : Using the appropriate window, record the following transactions for June 2019: Jun. 18 Provided 4 hours of Internet Consulting Services to the Singh Family
Career development services principles : Cica Professional Standards - How does each of the 7 Standards apply to the following roles and Summarise the 8 guidelines
Record each adjusting journal entry separately : Use the information below to prepare adjusting entries. Record each adjusting journal entry separately, and use June 30, 2019, for the date
CP2404 Database Modelling Assignment : CP2404 Database Modelling Assignment help and solution, James Cook University - assessment writing service - write a brief discussion of your solution

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the security concerns related to email security

What are the security concerns related to email security? First, evaluate the risks and potential consequences associated with an email security breach.

  Develop and enforce operational procedures

Countermeasures to consider for your responses: Fix known exploitable software flaws Develop and enforce operational procedures and access controls (data and system) Provide encryption capability Improve physical security Disconnect unreliable net..

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  What are common protection measures that you can do

What common critical or potentially dangerous areas can you find? What are common protection measures that you can do?

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  What consequences of neglecting basic security mechanisms

What might be some consequences of neglecting basic security protection mechanisms in social networking applications?

  Explain the concepts of information systems security

Explain the concepts of information systems security as applied to an IT infrastructure and describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.

  Discuss security concerns that the free hot spots can create

Research and discuss the security concerns that these free hot spots can create for the end user.

  What are the various threats to information security

What are the various threats to information security

  List of security activities or controls

List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data

  Present a research project for the physical security measure

Present a research project for the Physical Security measures for this new facility. Recommend categories of countermeasures and the associated risks.

  Social engineering attacks and counterintelligence

Social Engineering Attacks and Counterintelligence

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd