Week 8 28_march_2011.v3

796 views
764 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
796
On SlideShare
0
From Embeds
0
Number of Embeds
446
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Week 8 28_march_2011.v3

  1. 1. Gautam Koul 3067031 Renuka Umbarkar 3061872 Nadia Almualem 3045389 Komal Jondhra 3056416
  2. 2. <ul><li>Renuka : Project Manager </li></ul><ul><li>Project Co-ordinator -Monitor & Driver </li></ul><ul><li>Gautam :Research coordinator </li></ul><ul><li>Co-ordinator & resource investigator </li></ul><ul><li>Nadia : Quality manager </li></ul><ul><li>Implementer & specialist </li></ul><ul><li>Komal : Risk manager </li></ul><ul><li>Supporter & Finisher </li></ul>Nadia Gautam Renuka Komal
  3. 3. <ul><li>Total Population - 22,599,875 (2011 estimation) </li></ul><ul><li>Total Population - 19,855,288 (2006 sensus) </li></ul><ul><li>Employed – 11,433,000 </li></ul><ul><li>Unemployed – 604,000 </li></ul><ul><li>Ready for Teleworking – 2,270,000 </li></ul>
  4. 4. Social Issues Solution Isolation <ul><li>Video conferencing </li></ul>Monitoring Employee performance <ul><li>Enforcing hidden remote desktop access </li></ul><ul><li>Updating PowerJournal every hour </li></ul>Information security risks <ul><li>Real time monitoring by employer </li></ul><ul><li>Restrictions on viewing data from 3rd party computer </li></ul>
  5. 5. Technical issues Solution Client Server Model Peer-to-peer architecture Office computer locked or switched off Wake-on-LAN technology Complex configuration Simple installation No multiple video conferencing Multiple video conferencing
  6. 8. <ul><li>Risks identified can be categorised as: </li></ul><ul><li>Social risks </li></ul><ul><li>Team risk </li></ul>
  7. 9. Risks Risk Mitigation Strategy Isolation/Lack of group stimulation <ul><li>Multiple video conferencing </li></ul>Monitoring <ul><li>PowerJournal ( employer get updates about employees ) </li></ul>face-to-face contact <ul><li>Telepresence ( 3D view of interaction) </li></ul>Performance Monitoring <ul><li>by calculating ROI ( reports that identify trends in the work performance) </li></ul>Understanding of working patterns <ul><li>Psychological profiling questionnaire </li></ul>
  8. 10. Likelihood Consequence likely Possible High Medium Likelihood & Consequence Approach to security risk Risk Analysis Absolute certain Unlikely Rare Insignificant Minor Moderate Major Catastrophic <ul><li>Fraud Identity </li></ul><ul><li>Physical security </li></ul>Networking Failure <ul><li>Communication Issues </li></ul><ul><li>Letting family and friends use work-issued devices </li></ul><ul><li>Careless use of Wi-Fi and accessing unsecured networks </li></ul><ul><li>Protection of paper records </li></ul>Infrastructure
  9. 11. Risks Risk mitigation strategy Team member is sick <ul><li>BackupPlan/temporary replacement </li></ul>Data is lost <ul><li>Backup of data </li></ul>Group Disagreement <ul><li>Detailed Discussions </li></ul>Communication issues <ul><li>Communication plan </li></ul>Insufficient Review <ul><li>Time management </li></ul>

×