...(Information Systems Development) • (Web Systems Development) BSc/BSc (Hons) Information Technology Management for Business BSc (Hons) Computer Games (Design) BSc/BSc (Hons) Cyber Security and Networks BSc/BSc (Hons) Networked Systems Engineering IT PROJECT MANAGEMENT 1 module code M3G405252 MODULE HANDBOOK – TRIMESTER A SESSION 2015/2016 Module Code: M3G405252 Module Title: IT PROJECT MANAGEMENT 1 Standard Module Abbreviation: ITPM1 Module Level: 3 Credit Points: 20 Module Leader: Edwin Gray, Office: M609, email:e.gray@gcu.ac.uk September 2015 Issue 1 01/09/2015 Edwin M Gray, BA, MSc, MBCS, CITP, CPSSADM Contents Page 1 Introduction 3 2 Module Overview 3 3 Module Descriptor 4 4 Module Assessment 7 5 Feedback 10 6 Indicative Reading 10 7 The Library, Saltire Centre 11 8 Learning Material Supplied By Module Leader 12 9 Module Delivery Structure 12 10 Learning and Teaching Plan 14 M3G405252 IT PROJECT MANAGEMENT 1 INTRODUCTION This handbook gives details of the module content, teaching schedule, recommended reading, assessment and feedback strategies used for students undertaking the module IT Project Management 1 (M3G405252 (old code: COMU350) Module Leader contact details: Eddie Gray, M609, (e.gray@gcu.ac.uk) Programmes Taking This Module This module’s host programmes are: • P01627 BSc/BSc (Hons) Computing (Information Systems Development) ...
Words: 3307 - Pages: 14
...analysis of the current project risk management Procedure followed by the Spanish Business Unit of an automotive multinational company, which manufactures steering wheels and airbag modules. Different changes are established in the current procedure for the purpose of defining and implementing a project risk management procedure more useful and efficient. Introduction In the competitive business environment, organizations are seeking to get and stay ahead of the competition by making significant advances in the products and services, and operating as efficiently as possible. Many businesses use projects as vehicles to deliver that competitive advantage. Clearly each organization wishes to move ahead as quickly as possible, and that involves taking risk as the business exposes itself to a range of uncertainties that could affect whether or not it achieves its desired aim. Risk can be broadly defined as the probability of variation surrounding an anticipated outcome. Risk has been examined across multiple Disciplines, including economics and management. Within the project management context, the important thing is not keep risk out Projects, but to ensure that the inevitable risk associated with every project is at a level which is acceptable, and it is effectively managed. A project risk management includes the processes concerned with identifying, analyzing and responding to project risk. It includes...
Words: 1909 - Pages: 8
...Analysis of the Regency Plaza case study 4.0 Risk Evaluation and Management of Regency Hotel Project Any project will presents risk elements that represent opportunities or threats that can undermine the smooth running or even completion of the project. Similarly the Regency Plaza project with its high stake of the deliverables, careful managing of risk should be top priority. Using the four stages of Risk Management framework, we shall attempt to evaluate how well risk was managed in the case Regency Plaza project. 4.1 Risk Identification: Sources of Risk Identifying the sources of risk is paramount; detect as many as possible and should be directly related to the project objectives. Uncertainties will happen during the project runtime; hence identification of all possible of risk elements should be meticulously specified, and in the case of Regency Plaza, it can be associated with the design, development, quality, staffing, schedule and budget. Since the Regency Plaza was a mixed use project, and being the first of its kind undertaken by the Group, they may lack the experience in running this project. This was further compounded by the complication of the size and layout of the floor plate in terms of the difficulty of designing a structure to accommodate condominiums over the hotel rooms, seated over a parking garage. Elevator core location and column spacing were essentially fixed by these constraints. At the same time issues such as length of the hallways, floor...
Words: 1267 - Pages: 6
...teams for five risks in the areas of Engineering, Manufacturing, Quality Operations, and Supply Chain. The project team has assessed the benefits, costs, and risks of alternative contingency strategies and have selected several plans that we recommend for each of the core risks. The project team has evaluated the probability and impact of each of the core risks, and prioritized them using a scoring method below. These two dimensions used to evaluate and determine the score and priority of the risk valued as Low=1, Medium=2, and High=3. The five major risk that will adversely effect the project schedule, cost, and ultimately the success of the project are the event that the LapDock App software module is not completed on time. Second to that would be ensuring high compatibility with the various smartphones and their operating systems. Third is the maintaining the quality of the LapDock hardware manufactured by our oversees partners. The fourth risk event is the possibility that our components supplier goes out of business, or has problems delivering parts due to environmental or political factors. The fifth core risk is the event that LapDock devices and its packaging are damaged during shipping due to production process and quality of materials. The Risk Identification List shown in Fig 1 below summarizes the risk analysis and evaluation. |Risk Identification List | |Risk Analysis ...
Words: 1383 - Pages: 6
...DRAFT PROJECT PROPOSAL TEMPLATE SECTION I I. BACKGROUND OF PROJECT AND OTHER BASIC INFORMATION a) Title of the Project b) Does the project fall under an existing Mission Mode Project (MMP)? If yes state which? c) Is the project: i) A Pilot or ii) A Roll out of the project subsequent to Pilot phase (give details of pilot in previous experience section) iii) Roll out Project without Pilot phase d) Project Initiator details i) Department/ Ministry initiating the project (Centre/State) ii) Background of the department/ ministry iii) Name and Job Title of the key contact person (person responsible for initiation) iv) Contact details: □ Address : □ Fax : □ Landline : □ Mobile : □ Email : e) Implementing Agency details i) Name of the Implementing Agency ii) Date of Establishment (if applicable) iii) Name and Job Title of the key contact person (person responsible for implementation) iv) Contact details : □ Address : □ Fax : □ Landline : □ Mobile : □ Email : f) Location of project implementation SECTION II II. PROJECT OVERVIEW OR SUMMARY Provide a project snapshot covering the following aspects: a) Identification of all stakeholders b) Introduce the problem/issue the project is designed to address c) Explain...
Words: 1124 - Pages: 5
...from RFID devices installed in a class rooms. Based on the verification of student identification at the entrances system, the RFID tag can be embedded in the ID card of the individual. First to activate a new session(hour) the teacher swipes her RFID tag this marks a new attendance session during which the students can swipe once to increment their attendance. The RFID module operate in 125Khz range, when a tag passes through its vicinity, the module senses its presence and extracts its unique serial number and passes this code into microcontroller which matches the code to the correct person and increments the attendance of the particular person. CONTENTS 1.Introduction 2.Block Diagram and Description 3.Circuit -Circuit Diagram -Circuit Description 4.Software 5.Printed Circuit Board -PCB Layout 6.Estimate 7.Conclusion 8.Bibpiography INTRODUCTION The two major problems faced by organizations are time consuming manual attendance and wastage of electrical power. Our project is going to solve these problems by using RFID technology. The project is designed to store up to 50 card IDs but it is easily scalable up to 65000 card IDs but for that it requires external memory. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID...
Words: 899 - Pages: 4
...E-COMMERCE (TIT-501) UNIT I Introduction What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston...
Words: 2913 - Pages: 12
...start (( INSTRUCTIONS: Use the answer sheet provided and fully shade the box corresponding to the letter of your best choice. GOODLUCK!( 1. The day-to-day work of management teams will typically comprise all of the following activities except: A. decision making. B. planning. C. cost minimizing. D. directing operational activities. 2. Which of the following is the proper sequence of events in an activity-based costing system? A. Identification of cost drivers, identification of cost pools, calculation of cost application rates, assignment of cost to products. B. Identification of cost pools, identification of cost drivers, calculation of cost application rates, assignment of cost to products. C. Assignment of cost to products, identification of cost pools, identification of cost drivers, calculation of cost application rates. D. Calculation of cost application rates, identification of cost drivers, identification of cost pools, assignment of cost to products. 3. During a recent accounting period, Marty's shipping department processed 26 orders. Each order typically takes four hours to complete; however, the average time increased to five hours because of various departmental inefficiencies. If...
Words: 1295 - Pages: 6
................2 2.1 Lexical cohesion and discourse organization................................................2 2.1.1 Introduction.............................................................................................2 2.1.2 Lexical cohesion and genre.....................................................................2 2.1.3 Lexical cohesion and coherence .............................................................3 2.2 The role of lexical cohesion in the segmentation and centrality of discourse units......................................................................................................................5 2.2.1 Introduction.............................................................................................5 2.2.2 Discourse segmentation ..........................................................................6 2.2.3 Central discourse units............................................................................8 2.2.4 Conclusion ..............................................................................................8 3 Lexical cohesion analysis....................................................................................9 3.1 The patterns of lexical cohesion: chains and networks .................................9 3.2 Classification of lexical cohesive relations .................................................12 3.3 Elements forming lexical...
Words: 14120 - Pages: 57
...injures, damage to assets and setbacks which will adversely affect our organisations pursuit of excellence and leadership. SCOPE These guidelines apply to all departments within our organisation and its controlled entities. They apply to all Departments, Divisions, Centres, controlled entities and joint ventures. RESPONSIBILBITIES As per the Risk Management Policy, risk management is a whole-of-organisation activity. All members of our organisation have a role to play; in particular, staff should take an active role in the identification of potential business and operational risks facing their department or Division, programs, research, business or work unit and take steps to successfully treat these risks to minimise their frequency and consequences on our organisation. We promote a risk management culture. For senior management, this role may be more strategic in nature, however, line management are responsible for the identification of risks and the development of mitigation plans. This includes the implementation of risk reduction strategies within their areas...
Words: 4957 - Pages: 20
...also upload an evaluation stage a friend has done to give the writer an idea of what i want exactly. QUESTION TO ANSWER. 1. An objective review of the quality of own work. 2. An assessment of the strengths and weaknesses of the original plan. 3. A review of the plan and modifications made to inform improvements to own work. 4. An indication of how the integrative nature of the assignment enhanced your own understanding of the task. 5. Identification of any problems encountered and any skills gained in the process of completing the project. Review of Own Work with Reflection Identification of New Learning and Relate Activity to Plan with gaps or omission � high marks High marks if impact of any new learning is identified to practice Identification of the way the Project Integrates Knowledge & Understanding of Core Units in HNC Identifies skills gained and Integration of Theory & Practice consistently during Project No award if the above is not identified Strengths & Weakness of Original Plan Analysis of Whether the Plan was Sufficient in Meeting Aims of Activity. High marks if feedback from individual patient/client or from members of the care team is used (questionnaire, written or oral) Review of the whole Project High marks if: Modifications, Improvements and Recommendations for Future Activities being Achievable & Realistic. Difficulties described & contingencies explained. Some suggestions but not...
Words: 366 - Pages: 2
...CHAPTER I INTRODUCTION Background of the Study Student absences jeopardize student and school success. Academic achievement scores are correlated with school attendance. Students who are not at school cannot receive instruction. Excessive school absence is a precursor of school dropout and is related to juvenile delinquency. And, because average daily attendance rates are a common determiner of school funding, absences mean that schools have less resources to do the job. Given all this, it is not surprising that reducing school absences is a top priority for many schools. (http://smhp.psych.ucla.edu) Now-a-days intelligent automation has stepped its presence in every field all over the world. This project has a stepping in the attendance and power management of the classrooms in the colleges/schools. The use of low cost technologies for highly reliable applications with the help of newly innovated algorithms makes the automation process to reach the consumers at cheaper and reliable cost. (http://www.muxtronics.com) The widespread of embedded computer networks as part of everyday peoples’ lives is leading the current research towards smart environments and Ambient Intelligence (AmI). AmI is a new information paradigm where people are empowered through a digital environment that is “aware” of their presence and context and is sensitive, adaptive and responsive to their needs. Mark Weiser, described the smart environments as physical worlds that invisibly interact...
Words: 4807 - Pages: 20
...Chapter 1 Introduction Chapter one is composed of three (3) parts: (1) Organizational Background; (2) Organizational Unit Description; (3) Current System Description. Part one, Organizational Background, specifies the history and present structure of the whole organization and its situation. Part two, Organizational Unit Description, describes the structure of the organizational unit and its situation. Part three, Current System Description, narrative flow of the current system and its Data Flow Diagram. Nowadays, computers are very important. People use this modern technology to make their work easier and faster. Persons who are computer-literate enjoy their work because it’s not tiresome and they can finish work in a very short time. The Electronic Records Management System of the Registrar’s Office of West Visayas State University – Janiuay Campus is a records management system that aids the administrative staff conduct their day–to–day business of recording, data organization and account integration. An Electronic Records Management System is a software application for university offices that manages students and faculty data with regards to their records status. It enables students to check their status and get their copy of grades and Transcript of Records easily. The Electronic Records Management System is easy to use. It helps reduce the time spent on administrative tasks and allows the staff to attend to student’s records. It also processes and...
Words: 4567 - Pages: 19
...A Risk Management Standard Published by AIRMIC, ALARM, IRM: 2002 Introduction This Risk Management Standard is the result of work by a team drawn from the major risk management organisations in the UK - The Institute of Risk Management (IRM),The Association of Insurance and Risk Managers (AIRMIC) and ALARM The National Forum for Risk Management in the Public Sector. In addition, the team sought the views and opinions of a wide range of other professional bodies with interests in risk management, during an extensive period of consultation. Risk management is a rapidly developing discipline and there are many and varied views and descriptions of what risk management involves, how it should be conducted and what it is for. Some form of standard is needed to ensure that there is an agreed: should be viewed not just in the context of the activity itself but in relation to the many and varied stakeholders who can be affected. There are many ways of achieving the objectives of risk management and it would be impossible to try to set them all out in a single document.Therefore it was never intended to produce a prescriptive standard which would have led to a box ticking approach nor to establish a certifiable process. By meeting the various component parts of this standard, albeit in different ways, organisations will be in a position to report that they are in compliance.The standard represents best practice against which organisations can measure themselves. The standard has...
Words: 4400 - Pages: 18
........ 2 Current Inter-local Agreement ................................................................................................................... 2 Scope of Management Services ........................................................................................................... 2 Achievements ....................................................................................................................................... 3 Consolidation (IT Shared Initiative) ........................................................................................................... 3 Joint Project Analysis..................................................................................................................................... 4 Automated Finger Print Information System (AFIS) .................................................................................. 4 Microwave and Fiber Communications Project ......................................................................................... 5 Joint Datacenter Project ............................................................................................................................ 7 Fusion Center ............................................................................................................................................ 9 NeoGov...
Words: 4329 - Pages: 18