Identifying customers for project, Other Management

Assignment Help:

Identifying customers

Customer is responsible for communicating the project needs and also verifying that the requirements have been met at the project completion. The customer may be internal like the elements in the supplier-process-customer chain, external clients, the suppliers and the end users or both. Identifying internal customers is difficult and identifying customers involves four steps which include the following:

  • Analysing the contract - The contract analysis will help to recognise the external customer or the end-client. This will also help to recognise the end user. If the contract information does not contain the end user particulars then the project team will have to coordinate directly with the customer to decide if the end user is someone other than the customer. The contract analysis will reveal the suppliers or the subcontractors. If the key suppliers are not particularly recognised as the subcontractors then the project team will have to coordinate among their own technical elements or with the organisation's procurement office to determine who among the suppliers will be part of the project implementation.
  • Analysing the project team and their organization - This helps to identify the internal customers. This will have to disclose how the work will proceed, which project team or the organisational elements will take part and how it will be linked in the supplier- customer process chain.
  • Analyse product use - This analysis begins with identifying the end user and then further understanding who will use the product and how. Quality signifies satisfying the customer requirements and not just meeting the specifications in the contract. Analysing the product use may also disclose the hidden customers, who do not use the product directly but are indirectly affected by their usage like the environment and the aesthetics of the local community.
  • Analyse the means of production - This is necessary even if the project involves manufacturing the product, delivering the service or performing some of the intellectual or the administrative activity. This can be clarified or confirmed to the internal customers who have already been identified and approved.

Related Discussions:- Identifying customers for project

Security issues in banking industry, a) Security issues are a major source...

a) Security issues are a major source of concern for everyone both inside and outside the banking industry. There are some security questions that need to be considered before dep

Efficient market hypothesis, QUESTION (a) (i) Discuss the empirical evi...

QUESTION (a) (i) Discuss the empirical evidence in relation to weak form market efficiency (ii) Explain fully how you would conduct a test of semi-strong form of the Efficie

Describe the conflict-resolving styles, Question: (a) Conflicts, as an ...

Question: (a) Conflicts, as an aspect of managing change, is inevitable in organisations. Show the main sources of conflict in the workplace and elaborate on three of them?

Outline various steps of the policy analysis process, QUESTION 1 Policy...

QUESTION 1 Policy implementation is the most critical stage of the policy process. Critically analyse some of the main constraints that hinder the implementation of public poli

Telecommunication technologies, Telecommunication Technologies: Teleco...

Telecommunication Technologies: Telecommunication today involves microprocessors, digitization of information (audio, video and text) and its transmission across communication

Organizational management, 1 list the various reasons in organization xyz w...

1 list the various reasons in organization xyz which lead to its development

Data and information - library management system, Data and Information  ...

Data and Information  The term "data" (plural form of datum) refers to "an individual fact, statistic, or a piece of information or a group or a body of facts, statistics or t

Explain security risk management process, Question: a) Describe why the...

Question: a) Describe why the following security measures are important for e-banking and how are they implemented? (i) Data Confidentiality (ii) Data Integrity (iii) Aud

Call number - library classification , Call Number: The call numbers' ...

Call Number: The call numbers' for a document consists of three elements, viz.,class number, book number and collection number. The following example will show the presence of

Porter''s five forces model, QUESTION 1 Implementation of selected stra...

QUESTION 1 Implementation of selected strategies is a phase in the strategic management process. Discuss the key issues that need to be considered in this phase. QUESTION 2

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd