What are the project risk management processes as described

Assignment Help Computer Engineering
Reference no: EM133466612

Case Study: There was a company (XYZ Cruise Lines) in the vacation industry that had a reservations system for their cruise operations that was designed for agents to book cruise passengers for individual bookings within 5 to 7 minutes. This system created a competitive advantage among travel agents as they could book their clients fast from the start of the process to the payment screen. Their largest competitor had a reservation system that took approximately 15 minutes, which was a clear competitive advantage for XYZ Cruise Lines. However, the competitor had an automated process to check in customers at the pier and provided an electronic boarding pass where the passengers would carry an identification card with a magnetic strip to allow for faster embarkation of the ship at the pier and at the ports of call. XYZ Cruise Lines was still utilizing a manual system for embarkation and utilized paper boarding passes. Because customers tend to remember any bad experiences with the beginning (embarkation process) and the end (disembarkation process) of the trip more than during the trip, the embarkation process caused a lot of dissatisfaction, especially among those passengers who sailed with the competitor in the past. In an effort to improve the process, a state-of-the art ship embarkation system was being developed. This new planned system would allow the passengers to be processed faster for the embarkation process and a plastic card with a magnetic strip would be activated and utilized as the electronic boarding pass. Additionally, this same card would also be utilized as the point of sale purchase card, creating a cashless process for the passengers to buy drinks and other extras on board the ship during the voyage. This would further XYZ as the competitive leader in the industry.

This new system would have to communicate with the current reservations system via satellite connectivity. This software development project had four main components: (a) ship embarkation system, (b) point of sale system (POS), (c) satellite technology utility for connectivity from the HQ's reservations system to the ship, and (d) upgrade to the existing reservations system to generate the upload to the ship's embarkation and POS systems. All components were completed by December 1st and were ready for the integration testing process so that the project can be implemented on December 15th just before the start of the busy season, at which time further software project implementations were not permitted for 6 months due to the heavy volume impacting the reservations system.

When it came time for the integration testing, the upgrade for the reservations system could not be made for the test environment because the upgrade was not moved to the quality control environment and the software changes were still in the programmer's work file. No other developer or anyone in IT management had access to these files. The programmer that worked on these changes had a heart attack and was in the hospital. As a result, the project manager informed everyone that they were going to miss the deadline and now had to wait 6 more months before this project could be implemented and the business sponsor was furious.

The quality assurance manager asked the reason for the missed deadline, and when she heard the story, she asked the IT project manager for the risk management plan. He said that they do not believe in planning for risk events because this was a negative process and they support a positive approach towards the systems development process. Because there was not a risk matrix created and the risk for the developer to have a heart attack was not considered, the project was delayed and the company lost an opportunity to improve their competitive advantage, which equated to millions of dollars in potential future bookings.

After reading the quality assurance manager's report, senior management asked the following questions.

Question 1: What are the project risk management processes as described in the PMBOK® Guide?

Question 2: Explain why a project manager, or any stakeholder, should not view risk planning for projects as only a negative activity?

Question 3: Did the organization follow due diligence regarding the creation of a risk management plan, assess all major risks, and develop appropriate risk responses and a plan for monitoring risks? Explain your rationale.

Question 4: Should the risk event have been identified in the beginning by practicing sound quality control? Why or why not with details?

Question 5: What are some contingency plans or actions that could have been taken to limit the impact of this possible risk event and other such related events, such as a key team member leaving for any reason? Is there a quality management component that should be considered (If so, discuss what it entails)?

Question 6: What would be your quality assurance recommendations for such projects in the future based on this case?
Management is upset that there is an occurrence of a major risk that could affect the project. Your job is to prepare a 5- to 8-minute narrated PowerPoint presentation that addresses the six questions posed by senior management and reflects your research and thorough analysis, synthesis, and evaluation of the case.

You must have a title slide where you introduce yourself and present all resources at the end of your presentation. Your references should be in APA format. Also, your presentation must be professional; therefore, bullets should be brief; you should not have big paragraphs or long sentences; you should utilize the notes section; if images are used, they should be relevant to your presentation; font size and style should be consistent; and grammar must have high priority.

Reference no: EM133466612

Questions Cloud

What section of the human rights act 1998 : What section of the human rights act 1998 discusses who is considered a victim of an unlawful act infringed by a public authority?
Describe how these functions would be essential for business : Describe at least two business scenarios where "commit" and "rollback" would be required. - Describe how these functions would be essential for business
How would you characterize what you have learned in course : How would you characterize what you have learned in this course? What were your significant learning moments of the different modules?
What are the different forms of legal proceeding : What are the different forms of legal proceeding and what form of legal proceedings should one undertake if their conventional right to freedom of assembly.
What are the project risk management processes as described : What are the project risk management processes as described in the PMBOK® Guide? - Explain why a project manager, or any stakeholder, should not view risk
Who can bring an action under the human rights act 1998 : Who can bring an action under the human rights act 1998? (uk)
Identify ways to adapt to the changing business environment : Recommend initiatives to support your objectives to improve the strategic plan. Identify ways to adapt to the changing business environment.
Key pieces of information you need to initiate court filing : Review the link below and discuss what key pieces of information you need to initiate a court filing.
Write annotations for each of five sources that you identify : Write annotations for each of the five sources that you identified in your source list from Last Week Assignment . Each annotation needs to include a summary

Reviews

Write a Review

Computer Engineering Questions & Answers

  What connotations does the word have for you

The word "hacker" used to be complimentary, describing a programmer who buried his or her head in the code. What connotations does the word have for you?

  Discuss the damage caused by leaks

The disclosures at WikiLeaks have raised significant concerns about the damage caused by leaks. Some claim that in many ways, the Wiki Leaks founder

  Write a function that inputs a string

Write a function that inputs a string. Write a second function that changes the blanks in the string to tabs. Write a third function that displays the string. Call these three functions to read an input string, changes spaces to tabs in it then di..

  Write a security plan proposal as a project

As a security manager or administrator of a fictitious company, write a Security Plan Proposal as a project draft document with the formats in the bullet.

  Write a program that inputs the initial amount

Write a program that inputs the initial amount, an interest rate per year, and the number of years the money will accrue compound interest.

  Discussion on cryptocurrencies and security

Prepare a 3 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken.

  How would you respond to her complaint

Assuming that you are Barbara's systems analyst friend, how would you respond to her complaint?

  Find sql statements and screenshots of the result

Any other information you would like to retrieve from the database.

  How many computers are needed for this system

What hardware is needed to have a web-site and client to browse the properties on that web-site?

  Related to investment in stock group

Specify the minimum amount Trader must invest in each stock group in order to achieve the investment goal?

  Write python code that will transfer a file reliably

Write python code that will transfer a file reliably between two hosts (a sender and a receiver).

  Discuss a practical example of system engineering

Write a 500 word essay paper that discusses the topic below. Discuss a practical example of System Engineering. Your paper should be in APA format.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd