SlideShare a Scribd company logo
Comparison Results
The two articles are 88% unique.
Executive summary
Executive summary
The management at ABC Company has tasked the ICT
department to come up with a surveillance system that is aimed
raising the level of internal security in the company. As the ICT
department’s system analyst, I have to develop a work plan that
will oversee the project from the first to the last stage. This
paper outlines the vital steps in the project, the proposed budget
for the projectproject, the deliverables and the measurements
for the success of the project (Williams, 2005). The aim of the
paper is to justify the viability of the project in meeting the
specific needs of the company.
The administration of ABC Company has burdened the ICT
department to research and formulate a surveillance system
which is targeted to raise the level of internal security of the
company. In my capacity as the ICT department’s system
analyst, I am bound to come up with the work plan which will
act as a guide to the project from the initial stages to its
completion. This paper bring out the important steps in the
foresaid project, the proposed budget for the project as well as
the deliverables together with the measurements for the project
to go through successfully (Williams, 2005). The purpose of
this paper is to validate and substantiate the feasibility of the
project in the meeting the specifications of the company and its
ability to meet the needs of the company.
Recommend a project portfolio management method for your
selected project.
Recommend a project portfolio management method for your
selected project.
For purpose of this project, the applied project management
method shall be pipeline management. Pipeline management
method includes identification of a capital investment project
and coming up with measurable deliverables which are to be
met by the project. The application of company’s resources is
both time based and objective based. In this project, the time
frame is within the 12 months of developing the surveillance
system, 2 months of pilot phase, 4 months of change over and 3
months of performance measurement (John, 2013).
The project management method that shall best suit the purpose
of the project at hand is the pipeline management. This
methodology involves the identification of a capital investment
project and putting forth measureable deliverables that ought to
be met by the project. More still, The application of company’s
resources is both time based and objective based. In the project
at hand, the span is limited to 12 months of developing the
surveillance system, 2 months of pilot phase, 4 months of
change over and 3 months of performance measurement (John,
2013).
Type of problem
Type of problem
Two main problems are to be solved by the development of the
surveillance system; first, the company seeks to intensify
internal security especially considering the high rate of crime
and terrorism activity, and secondly, the system shall be used as
a tool in internal controls and inspection program (Katalien, &
Pieter, 2013). These two areas have been a challenge in the
company especially the latter which has been affecting the
production in the company. Installation of surveillance systems
has been advocated for by the federal government in all
corporations to ensure that a comprehensive approach to
homeland security and international security.
The major areas of concern which will be addressed once the
surveillance system is implemented are the intensification of the
internal security, bearing in mind that the crime rates are in the
increase as well as terrorism activities and the second the
system will find its application in internal controls and
inspection programs (Katalien, & Peter, 2013). The two areas
for a long time have been a problem facing the company
particularly the later which has seen the company’s production
dwindling. As thus, the installation of a surveillance systems is
highly recommended by the federal government in all the
corporate intuitions to make sure an extensive approach to not
only homeland security, but also international security
Requirements
Requirements
Below are the requirements for the project
Following are the specifications of the project to be developed.
• A camera surveillance plan which shows the locations where
the cameras shall be located throughout the company’s premises
• A camera surveillance plan. This is to show the positions
throughout the company’s business.
• Local area network which shall help the company to
internetwork all the cameras and other gadgets within the
organizationorganization.
• Access to an internet such that all the cameras and other
gadgets within the organization can be inter-networked- A local
area internet is recommended for this purpose as it allows the
use of Ethernet cable connection to the electrical appliances.
• Enough cameras to be fitted in all the locations noted above
(John, 2013)
• Cameras- adequate in number to be fixed to all the locations
within the company’s premise as specified there before(
John,2013)
• A database management system which saves the data that is
captured by the cameras.
• A system that shall be storing the data which is streamed in by
the camera- a database management system is recommended for
this purpose.
• A remote server from where the cameras can be viewed
• A network topology that has a central location with a remote
server to enhance the viewing of cameras.
• Wide area network to connect the surveillance cameras with
the homeland security department or security firm (Daniels,
2014).
• Connection to a Wide Area Network (WAN) so that the
surveillance cameras are connected with the homeland security
firm (Daniels, 2014).
• A customized program which is used to capture data from the
surveillance cameras, view selected data, store data in the
database, among other artificial intelligence functions
• An over the counter program(Tailored/customized) that will be
utilized in the capture of data from the surveillance cameras,
viewing selected data, storage of data in a database besides
other Artificial Intelligence(AI) functions
• Data connection cables used for the interconnection of the
cameras with the remote computer (Williams, 2005).
• Components of internet connectivity establishment. For
instance, data connection cables used for interconnection to the
cameras with the remote computer (Williams, 2005).
• Back-up storage preferably a internet based virtual memory
• Countermeasures against data lose such as back-up storage
especially an internet based virtual memory.
• System developer
• Skilled individuals within the discipline of information and
technology such as System developer and database designers.
• System Management staff
• Technical staff that will be tasked with System Management
• Installation space within the company’s premises
• Adequate space within the business organization to allow
installation.
• Piping system for the connections
• Piping system for the connections that will be employed in
system management.
Proposed business problem solutions
Proposed business problem solutions
At the end of the project, the following business solutions shall
be attained
After the completion of the system development and its actual
implementation, the company will have gotten mitigation to the
various business problems earlier explored. The solutions are as
outlined below.
• Development of a program that helps in identification of
potential damage to the premises, properties and the persons
within the company by tracking the movements of all the
persons within the company’s premises (John, 2013)
• Potential damages to the premises, property and the employees
within the company will be minimized as the developed
program will be tracking the movements of all the people within
and around the company’s premises (John, 2013)
• Development of a program that shows the activities of the
employees within the organization with an aim of measuring the
individual production of the employees. This will help in
ensuring optimum individual production for the employees
• Establishment of a program that will be keeping track of all
the activities of the employees within the organization with the
key concern being establishing the production of employees.
This will lead to each employee trying to optimize his
productivity rate thus a rise in the production capacity.
• Creating a network that connects the company’s security
control with the homeland securitysecurity. This will help the
company to access faster assistance from the department of
homeland security should there be a security alert.
• Beefing up of security. The network creation will connect the
company’s security with the homeland security. This will
facilitate the access of security assistance from homeland
security by the company in the event of a security alarm. .
• Reduction of the cost of inspection. The system developed at
the end of this project will help in reducing the number of
professional inspectors that are required in the production
department of the company (Katalien, & Pieter, 2013).
• Cost reduction in key areas such as the inspection fee since
the number of inspection professionals required in the
production department of the company will significantly be
reduced in number once the system developed comes into
operation. (Katalien, & Pieter, 2013).
• The system that shall be developed at the end of the project
shall help the company to reduce the losses that are related to
poor surveillance like theft of property by company personnel,
and, looses from acts of crime and terrorism.
• Reduction of losses related to poor surveillance that leads to
theft of property by company personnel, crime and terrorism
activities once the system is developed in the long-run. The
profits on the other hand will be maximized.
• The company shall have reduced eventual liability in case
such a foreseen crime occurs due to negligence.
• The business premise will reduce eventual liability in the
event of unforeseen crimes that result from negligence.
State the vision and the goal of the project.
State the vision and the goal of the project.
Vision of the project
Vision of the project
The vision of the project is to ensure that ABC Company has a
robust security and surveillance system that helps in attaining
the company’s profit maximization goals and in ensuring that
the company attains international risk management status.
The goals of the projects are
The vision of the project is to enhance the beefing up of the
security of ABC Company .Besides, The surveillance system
will be geared to nothing else but will help in attaining the
company’s profit maximization goals and in making sure that
the company attains international risk management status.
• To ensure that within 21 months, the company has been able to
come up with a robust surveillance system
The goals of the projects are
• To ensure that the capital that is allocated to the project is
utilized optimally
• To ascertain that within a span of 21 months, the company has
been able to establish a robust surveillance system.
• To ensure that all the surveillance related risks that the
company faces have been dealt with comprehensively
(Francesco, Robbert, & Francesco, 2013).
• To spearhead optimal utilization of capital allotted to the
project development process.
Five (5) major deliverables of the project
• To ensure a comprehensive coverage and dealing of all the
surveillance related risks that the company faces (Francesco,
Robbert, & Francesco, 2013).
(A)Development of a surveillance system within the given time
limit :
Five (5) major deliverables of the project
The surveillance system should be installed within the required
time limit. This will assist the company to cut down on costs
caused as a result of delays like payment made to those
involved in its installation. The company’s staff will also have
enough time to learn how to use the system hence reducing the
costs incurred on training on how to use the system (Williams,
2005).
(A) Development of a surveillance system within the given time
limit :
(B) Development of a database that coordinates the business
activities and the security within the organization
The surveillance system ought to be put in place within the
required time limit. This will enable the company reduce on
costs that result from delays suck as payment made to the
technicians involved in the installation process. In spite of that,
the company’s staff will have substantial time to learn how to
use the system hence cutting down on the costs incurred on
training on how to use the system (Williams, 2005).
Business activities and the security of the organization should
be coordinated to reduce chances of losses that may be caused
as a result of theft by company’s employees or its potential
customers. The coordination of these two activities will also
reduce the threat of terrorist activities to the organization. This
will ensure that the security of all individuals dealing with the
company is guaranteed and thus enhancing the chances of the
company’s growth (Katalien, & Pieter, 2013).
(B) Development of a database that coordinates the business
activities and the security within the organization
Business activities and the security of the organization should
be well connected to minimize chances of losses that may be
caused due of theft by company’s employees as well as its
potential customers. In addition, the coordination of the two
activities will bring down the threat of terrorist activities to the
organization- this will make sure that the security of all
individuals dealing with the company is assured and thus
improving the chances of the company’s expansion (Katalien, &
Pieter, 2013).
(C) Training of staff on the usability of the newly developed
system
(C) Training of staff on the usability of the newly developed
system
Training of staff on how to use the newly developed system
prepares them to accept change instead of resisting it. Training
will also improve service delivery to customers because
transactions will be executed on a timely basis and according to
customers needs and specifications. This will end up giving the
company a competitive advantage over its competitors as a
result of efficient delivery of services.
Training of staff on the utilization of the newly developed
system prepares them to induce change at the same time
reducing chances of resistance. Also, the training will boost
service delivery to customers as transactions will be executed
on a timely basis and I accordance to customers’ needs and
specifications. This will end up giving the company a
competitive advantage over its worthy competitors- thanks to
the improved delivery of services.
(D) Ensuring that the company’s security control system is
connected to the homeland security
(D) Ensuring that the company’s security control system is
connected to the homeland security
While the company has the mandate ensuring that it has
maximized its internal security control system, the homeland
security agencies are more professional in the area and thus
their impact in the enhancement of security is paramount
(Francesco, Robbert, & Francesco, 2013). This projects target to
control a system that connects the company’s security control
system to the homeland securitysecurity so that data sharing on
security matters can be faster, intelligent and uncompromised.
Whereas the company has the sole responsibility of maintaining
and maximizing its internal security control system, the
homeland security agencies are more professional in the area
and thus their overall effect in the enhancement of security is
very important (Francesco, Robbert, & Francesco, 2013). This
projects aims to control a system that connects the company’s
security control system to the homeland security so that data
sharing on security matters can be swift, intellectual as well as
uncompromised.
(E) To come up with a project whose benefits outweighs the
cost of project development and implementation
(E) To come up with a project whose benefits outweighs the
cost of project development and implementation
While development of a surveillance system is a vital step in the
company’s strategic growth, the opportunity cost of the system
is a prime consideration in measurement of the utility of the
project. The benefits include; the reduced risk of theft and other
security issues, the increment in production in the company, the
reduction of the cost of supervision within the company and
increased investment by third parties due to the increased
confidence in the management among other direct and indirect
benefits (Francesco, Robbert, & Francesco, 2013).
Whereas development of a surveillance system is an important
step in the company’s premeditated growth, the opportunity cost
of the system is a major consideration in the overall
determination of utility of the project. The doles are as follows;
the reduced chances of theft and other security concerns, the
increment in the overall productive capacity of the company, a
reduction of the supervision cost within the company and
increased investment by third parties as a result of the increased
confidence in the management besides other direct not
forgetting indirect benefits (Francesco, Robbert, & Francesco,
2013).
Table containing the generic resources, people, equipment, and
materials needed to undertake the project.
Table containing the generic resources, people, equipment, and
materials needed to undertake the project.
The following table shows the utilization of generic resources,
people equipment and materials in the different activities within
the project
Following is a table denoting the utilization of the generic
resources, human resource, and equipment together with
materials in different acts within the project.
Determine the key success criteria for your project
Determine the key success criteria for your project
The success criteria for the project shall be based on the ability
to achieve the projected deliverables of the project. Some of
these shall include;
Successful completion of the project purely lies on the ability to
achieve the projected deliverables of the project. These
incorporate the following determinants.
• The completion of the project within the time limit of 21
months (John, 2013)
• Completion of the project development within the limited span
period of 21 (John, 2013)
• Ability of the system to send real-time signals to various
destinations including; the remote computer, the database and
the homeland security systems.
• Capability of the system to send real-time signals to various
destinations such as the remote computer, the database and the
homeland security systems.
• Ability of the system developed to reduce the cost of
production supervision and increasing the rate of staff
performance in the organization (Williams, 2005)
• If the system developed will reduce the cost of production
supervision and at the same time increase the rate of staff
performance in the organization (Williams, 2005)
• The security of the system from external and malicious
interference and lack of system redundancy.
• Security concerns such as safeguarding the system from
external and malicious interference and lack of system
redundancy.
Recommendations
Recommendations
The company shall require ensuring that the system that has
been developed has been updated from time to time. I
recommend that a system appraisal shall be carried out every
two years to ensure that the developments in the field of
Information technology and Camera Surveillance have been
adopted and updated. Staff training to effect these changes shall
also be required in the same time duration (Katalien, & Pieter,
2013).
During the implementation phase cycle of the system
development, the company is required to ascertain that the
system that has been developed is update regularly. I
recommend that a system appraisal shall be conducted
fortnightly to ensure that the developments in the field of
Information technology and Camera Surveillance have been
adopted and up to date. To crown it all, staff training for the
implementation these changes is too a necessary requirement
during the same time span. (Katalien, & Pieter, 2013).
Comparison Results
The two articles are 88% unique.
Executive summary
Executive summary
The management at
ABC Company has
tasked
the ICT
department to
come up with
a surveillance system that
is aimed raising the level of internal
security in the
company. As the ICT department’s system analyst, I
have to develop a work plan that will oversee
the
project from the
first to the last stage. This paper
outlines the vital
steps in the
project, the proposed
budget for the project
project, the deliverables and
the
measurements for the
success
of the project
(Williams,
2005). The aim of the paper is to justify the viability of
the project in meeting the specific
needs of the
company.
The administration of
ABC Company has
burdened
th
e
ICT department to
research and formulate a surveillance
system which is targeted to raise the level of internal
security of the company. In my capacity as the ICT
department’s system analyst, I am bound to
come up with
the work plan which will act as a g
uide to
the project from
the
initial stages to its completion. This paper bring out the
important
steps in the
foresaid
project, the proposed budget
for the project
as well as the deliverables together with
the
measurements for the
project to go through su
ccessfully
(Williams, 2005). The purpose of this paper is to validate
and substantiate the feasibility
of the project
in the meeting
the specifications of the company and its ability to meet the
needs of the company.
Recommend a project portfolio managem
ent method
for your selected project.
Recommend a project portfolio management method for
your selected project.
For purpose of this project, the applied project
management method shall be pipeline management.
Pipeline management method includes
iden
tification
of a capital investment project and
coming up with
measurable deliverables which are
to be met by the
project.
The application of company’s resources is
both time based and objective based. In
this project,
the time frame is within the
12 months
of developing
the surveillance system, 2 months of pilot phase, 4
months of change over and 3 months of performance
measurement (John, 2013).
The project management method that shall best suit the
purpose of the project at hand is the pipeline management
.
This methodology involves the
identification of a capital
investment project and
putting forth measureable
deliverables that ought
to be met by the project.
More still,
The application of company’s resources is both time based
and objective based. In
the
project at hand, the span is
limited to
12 months of developing the surveillance system,
2 months of pilot phase, 4 months of change over and 3
months of performance measurement (John, 2013).
Type of problem
Type of problem
Two
main problems are to be solved by the
development of the surveillance system; first, the
company seeks to intensify internal security especially
considering the high rate of crime and terrorism
activity, and secondly, the system shall be used as a
tool
in
internal controls and inspection
program
(Katalien, & Pieter, 2013). These two areas
have been
a
challenge in the company especially the latter which
has been affecting the production in the company.
Installation of surveillance systems has been
advocated
for
by the federal government in all
corporations to ensure that a comprehensive approach
to homeland security and international security.
The major areas of concern which will be addressed once
the surveillance system is implemented are the
intensificatio
n of the internal security, bearing in mind that
the crime rates are in the increase as well as terrorism
activities and the second the system will find its application
in internal controls and inspection
programs (Katalien, &
Peter, 2013). The two areas f
or a long time
have been a
problem facing the company particularly the later which
has seen the company’s production dwindling. As thus, the
installation of a surveillance systems is highly
recommended
by the federal government in all
the
corporate intuiti
ons to make sure an extensive approach to
not only homeland security, but also international security
Requirements
Requirements
Below are the requirements for the project
Following are the specifications of the project to be
developed.
Comparison Results
The two articles are 88% unique.
Executive summary Executive summary
The management at ABC Company has tasked the ICT
department to come up with a surveillance system that
is aimed raising the level of internal security in the
company. As the ICT department’s system analyst, I
have to develop a work plan that will oversee the
project from the first to the last stage. This paper
outlines the vital steps in the project, the proposed
budget for the projectproject, the deliverables and the
measurements for the success of the project (Williams,
2005). The aim of the paper is to justify the viability of
the project in meeting the specific needs of the
company.
The administration of ABC Company has burdened the
ICT department to research and formulate a surveillance
system which is targeted to raise the level of internal
security of the company. In my capacity as the ICT
department’s system analyst, I am bound to come up with
the work plan which will act as a guide to the project from
the initial stages to its completion. This paper bring out the
important steps in the foresaid project, the proposed budget
for the project as well as the deliverables together with the
measurements for the project to go through successfully
(Williams, 2005). The purpose of this paper is to validate
and substantiate the feasibility of the project in the meeting
the specifications of the company and its ability to meet the
needs of the company.
Recommend a project portfolio management method
for your selected project.
Recommend a project portfolio management method for
your selected project.
For purpose of this project, the applied project
management method shall be pipeline management.
Pipeline management method includes identification
of a capital investment project and coming up with
measurable deliverables which are to be met by the
project. The application of company’s resources is
both time based and objective based. In this project,
the time frame is within the 12 months of developing
the surveillance system, 2 months of pilot phase, 4
months of change over and 3 months of performance
measurement (John, 2013).
The project management method that shall best suit the
purpose of the project at hand is the pipeline management.
This methodology involves the identification of a capital
investment project and putting forth measureable
deliverables that ought to be met by the project. More still,
The application of company’s resources is both time based
and objective based. In the project at hand, the span is
limited to 12 months of developing the surveillance system,
2 months of pilot phase, 4 months of change over and 3
months of performance measurement (John, 2013).
Type of problem Type of problem
Two main problems are to be solved by the
development of the surveillance system; first, the
company seeks to intensify internal security especially
considering the high rate of crime and terrorism
activity, and secondly, the system shall be used as a
tool in internal controls and inspection program
(Katalien, & Pieter, 2013). These two areas have been
a challenge in the company especially the latter which
has been affecting the production in the company.
Installation of surveillance systems has been
advocated for by the federal government in all
corporations to ensure that a comprehensive approach
to homeland security and international security.
The major areas of concern which will be addressed once
the surveillance system is implemented are the
intensification of the internal security, bearing in mind that
the crime rates are in the increase as well as terrorism
activities and the second the system will find its application
in internal controls and inspection programs (Katalien, &
Peter, 2013). The two areas for a long time have been a
problem facing the company particularly the later which
has seen the company’s production dwindling. As thus, the
installation of a surveillance systems is highly
recommended by the federal government in all the
corporate intuitions to make sure an extensive approach to
not only homeland security, but also international security
Requirements Requirements
Below are the requirements for the project Following are the
specifications of the project to be
developed.
IIM-I300 Management Information Systems (50 Points)
Due 6/22
Assignment 2
Directions: Answer each question completely and in detail. If
the question has a minimum
word count, it is likely because it is a complex subject that
cannot be fully addressed in fewer
words. Cite your sources with in-text citations and references.
1. Research the Sarbanes-Oxley Act. Write a minimum of 500
words (this question only), cite your sources
using APA 6th style and completely address the following:
provide some background on the
economic conditions in the US that led to this law.
your answer.
2. Describe the relationship between information security
policies and an information security plan. How
are they different? What does each accomplish in an
organization. Why are they important?
3. Describe in detail the five steps an organization must do to
create an information security plan.
4. Provide a specific example for each of the three primary
security areas: (1) authentication and
authorization, (2) prevention and resistance, and (3) detection
and response. **Hint: Don’t just define
them…suggest actual technologies/products for each of the six
noted above (Two per area).
5. Describe the relationships and differences between hackers
and viruses. Be sure to discuss the
differences between white-hat hackers and black-hat hackers.
Describe how viruses are transmitted.
Name one major virus from the past 12 months that has been in
the news and describe its impact on
consumers and business.
IIM-I300 SU2014 Assignment 1
Due 6/8 11:59PM
50 points
Directions: Answer each question originally, completely and
thoughtfully (these are essay
questions, please treat them as such). Complete the assignment
and upload (MS Word file
attachments ONLY) to OnCourse Assignments (Assignment 1)
by the due date. Be sure to cite
your sources using APA 6th style. Missing or incorrect citations
will result in a deduction of
points. Each question is worth 10 points. Your Turnitin score
must be at or below 40% or no
credit will be given. Please see the syllabus located in
OnCourse Resources for information on
submitting late work.
1. Describe the information age. What is it and what are its
defining characteristics? Describe the
differences between data, information, business intelligence,
and knowledge. Provide
examples of each.
2. Explain systems thinking and how management information
systems enable business
communications. Provide an actual example from industry
(research the subject on the web
– provide your source(s)) where MIS enabled enhanced business
communication.
3. Describe Porter's Five Forces Model in depth and explain
each of the five forces. Give specific
examples for each of the five forces.
4. Demonstrate how a company can add value by using Porter's
value chain analysis (VCA) and
define the various aspects of VCA. Note that VCA is NOT the
same thing as Porter’s five forces
(it is often used in conjunction with it).
5. Explain why competitive advantages are temporary. Research
the web and provide two
examples of the temporary nature of competitive advantage.
Running head: INFORMATION TECHNOLOGY PROJECT
PROPOSAL 1
INFORMATION TECHNOLOGY PROJECT PROPOSAL 5
Executive summary
The management at ABC Company has tasked the ICT
department to come up with a surveillance system that is aimed
raising the level of internal security in the company. As the ICT
department’s system analyst, I have to develop a work plan that
will oversee the project from the first to the last stage. This
paper outlines the vital steps in the project, the proposed budget
for the project, the deliverables and the measurements for the
success of the project (Williams, 2005). The aim of the paper is
to justify the viability of the project in meeting the specific
needs of the company.
Recommend a project portfolio management method for your
selected project.
For purpose of this project, the applied project
management method shall be pipeline management. Pipeline
management method includes identification of a capital
investment project and coming up with measurable deliverables
which are to be met by the project. The application of
company’s resources is both time based and objective based. In
this project, the time frame is within the 12 months of
developing the surveillance system, 2 months of pilot phase, 4
months of change over and 3 months of performance
measurement (John, 2013).
Type of problem
Two main problems are to be solved by the development of
the surveillance system; first, the company seeks to intensify
internal security especially considering the high rate of crime
and terrorism activity, and secondly, the system shall be used as
a tool in internal controls and inspection program (Katalien, &
Pieter, 2013). These two areas have been a challenge in the
company especially the latter which has been affecting the
production in the company. Installation of surveillance systems
has been advocated for by the federal government in all
corporations to ensure that a comprehensive approach to
homeland security and international security.
Requirements
Below are the requirements for the project
· A camera surveillance plan which shows the locations where
the cameras shall be located throughout the company’s premises
· Local area network which shall help the company to
internetwork all the cameras and other gadgets within the
organization.
· Enough cameras to be fitted in all the locations noted above
(John, 2013)
· A database management system which saves the data that is
captured by the cameras.
· A remote server from where the cameras can be viewed
· Wide area network to connect the surveillance cameras with
the homeland security department or security firm (Daniels,
2014).
· A customized program which is used to capture data from the
surveillance cameras, view selected data, store data in the
database, among other artificial intelligence functions
· Data connection cables used for the interconnection of the
cameras with the remote computer (Williams, 2005).
· Back-up storage preferably a internet based virtual memory
· System developer
· System Management staff
· Installation space within the company’s premises
· Piping system for the connections
Proposed business problem solutions
At the end of the project, the following business solutions shall
be attained
· Development of a program that helps in identification of
potential damage to the premises, properties and the persons
within the company by tracking the movements of all the
persons within the company’s premises (John, 2013)
· Development of a program that shows the activities of the
employees within the organization with an aim of measuring the
individual production of the employees. This will help in
ensuring optimum individual production for the employees
· Creating a network that connects the company’s security
control with the homeland security. This will help the company
to access faster assistance from the department of homeland
security should there be a security alert.
· Reduction of the cost of inspection. The system developed at
the end of this project will help in reducing the number of
professional inspectors that are required in the production
department of the company (Katalien, & Pieter, 2013).
· The system that shall be developed at the end of the project
shall help the company to reduce the losses that are related to
poor surveillance like theft of property by company personnel,
and, looses from acts of crime and terrorism.
· The company shall have reduced eventual liability in case
such a foreseen crime occurs due to negligence.
State the vision and the goal of the project.
Vision of the project
The vision of the project is to ensure that ABC Company
has a robust security and surveillance system that helps in
attaining the company’s profit maximization goals and in
ensuring that the company attains international risk management
status.
The goals of the projects are
· To ensure that within 21 months, the company has been able to
come up with a robust surveillance system
· To ensure that the capital that is allocated to the project is
utilized optimally
· To ensure that all the surveillance related risks that the
company faces have been dealt with comprehensively
(Francesco, Robbert, & Francesco, 2013).
Five (5) major deliverables of the project
(A) Development of a surveillance system within the given time
limit :
The surveillance system should be installed within the required
time limit. This will assist the company to cut down on costs
caused as a result of delays like payment made to those
involved in its installation. The company’s staff will also have
enough time to learn how to use the system hence reducing the
costs incurred on training on how to use the system (Williams,
2005).
(B) Development of a database that coordinates the business
activities and the security within the organization
Business activities and the security of the organization should
be coordinated to reduce chances of losses that may be caused
as a result of theft by company’s employees or its potential
customers. The coordination of these two activities will also
reduce the threat of terrorist activities to the organization. This
will ensure that the security of all individuals dealing with the
company is guaranteed and thus enhancing the chances of the
company’s growth (Katalien, & Pieter, 2013).
(C) Training of staff on the usability of the newly developed
system
Training of staff on how to use the newly developed system
prepares them to accept change instead of resisting it. Training
will also improve service delivery to customers because
transactions will be executed on a timely basis and according to
customers needs and specifications. This will end up giving the
company a competitive advantage over its competitors as a
result of efficient delivery of services.
(D) Ensuring that the company’s security control system is
connected to the homeland security
While the company has the mandate ensuring that it has
maximized its internal security control system, the homeland
security agencies are more professional in the area and thus
their impact in the enhancement of security is paramount
(Francesco, Robbert, & Francesco, 2013). This projects target to
control a system that connects the company’s security control
system to the homeland security so that data sharing on security
matters can be faster, intelligent and uncompromised.
(E) To come up with a project whose benefits outweighs the
cost of project development and implementation
While development of a surveillance system is a vital step
in the company’s strategic growth, the opportunity cost of the
system is a prime consideration in measurement of the utility of
the project. The benefits include; the reduced risk of theft and
other security issues, the increment in production in the
company, the reduction of the cost of supervision within the
company and increased investment by third parties due to the
increased confidence in the management among other direct and
indirect benefits (Francesco, Robbert, & Francesco, 2013).
Table containing the generic resources, people, equipment, and
materials needed to undertake the project.
The following table shows the utilization of generic resources,
people equipment and materials in the different activities within
the project
Determine the key success criteria for your project
The success criteria for the project shall be based on the ability
to achieve the projected deliverables of the project. Some of
these shall include;
· The completion of the project within the time limit of 21
months (John, 2013)
· Ability of the system to send real-time signals to various
destinations including; the remote computer, the database and
the homeland security systems.
· Ability of the system developed to reduce the cost of
production supervision and increasing the rate of staff
performance in the organization (Williams, 2005)
· The security of the system from external and malicious
interference and lack of system redundancy.
Recommendations
The company shall require ensuring that the system that
has been developed has been updated from time to time. I
recommend that a system appraisal shall be carried out every
two years to ensure that the developments in the field of
Information technology and Camera Surveillance have been
adopted and updated. Staff training to effect these changes shall
also be required in the same time duration (Katalien, & Pieter,
2013).
Running head: INFORMATION TECHNOLOGY PROJECT
PROPOSAL
1
Executive summary
The management at ABC Company has tasked the ICT
department to come up with a
surveillance
system that is aimed
raising the level of internal security in the company.
As the
ICT department’s system analyst, I have to develop a work plan
that will oversee the project
from the first to the last stage.
This paper outlines the vital steps in the project, the proposed
b
udget for the project, the deliverables and the measurements for
the success of the project
(Williams, 2005)
. The aim of the paper is to justify the viability of the project in
meeting the
specific needs of the company.
Recommend a project portfolio man
agement method for your selected project.
For purpose of this project, the applied project management
method shall be pipeline
management.
Pipeline management method includes identification of a capital
investment
project and coming up with measurable deliverables which are
to be met by the project. The
application of company’s resources is
both time based and objective based.
In this project
, the
time frame is within the 12 months of developing the
surveillance system, 2 months of pilot
phase, 4 months of change over and 3 months of performance
measurement
(John, 2013)
.
Type of problem
Two main problems are to be solved by the development o
f the surveillance system; first,
the company seeks to intensify internal security especially
considering the high rate of crime and
terrorism activity, and secondly, the system shall be used as a
tool in internal controls and
inspection program
(Katalien,
& Pieter, 2013)
.
These two areas have been a challenge in the
company especially the latter
which has been affecting the
production in the company.
Installation of
surveillance
systems has been advocated for by the federal government in all
corporations
to ensure that a comprehensive approach to homeland security
and international
security.
Requirements
Below are the requirements for the project
·
A
camera surveillance plan which shows the locations where the
cameras shall be located
throughout the company
’s premises
·
Local area network which shall help the company to
internetwork all the cameras and other
gadgets within the organization.
·
Enough cameras to be fitted in all the locations noted above
(John, 2013)
Running head: INFORMATION TECHNOLOGY PROJECT
PROPOSAL 1
Executive summary
The management at ABC Company has tasked the ICT
department to come up with a
surveillance system that is aimed raising the level of internal
security in the company. As the
ICT department’s system analyst, I have to develop a work plan
that will oversee the project
from the first to the last stage. This paper outlines the vital
steps in the project, the proposed
budget for the project, the deliverables and the measurements
for the success of the project
(Williams, 2005). The aim of the paper is to justify the viability
of the project in meeting the
specific needs of the company.
Recommend a project portfolio management method for your
selected project.
For purpose of this project, the applied project management
method shall be pipeline
management. Pipeline management method includes
identification of a capital investment
project and coming up with measurable deliverables which are
to be met by the project. The
application of company’s resources is both time based and
objective based. In this project, the
time frame is within the 12 months of developing the
surveillance system, 2 months of pilot
phase, 4 months of change over and 3 months of performance
measurement (John, 2013).
Type of problem
Two main problems are to be solved by the development of the
surveillance system; first,
the company seeks to intensify internal security especially
considering the high rate of crime and
terrorism activity, and secondly, the system shall be used as a
tool in internal controls and
inspection program (Katalien, & Pieter, 2013). These two areas
have been a challenge in the
company especially the latter which has been affecting the
production in the company.
Installation of surveillance systems has been advocated for by
the federal government in all
corporations to ensure that a comprehensive approach to
homeland security and international
security.
Requirements
Below are the requirements for the project
the cameras shall be located
throughout the company’s premises
internetwork all the cameras and other
gadgets within the organization.
(John, 2013)

More Related Content

Similar to Comparison ResultsThe two articles are 88 unique. Executive s.docx

merged_document
merged_documentmerged_document
merged_document
Avikal Chhetri
 
project plan
project planproject plan
project plan
Jayshankar Kumar
 
The Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docx
The Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docxThe Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docx
The Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docx
todd771
 
Page 1A Payroll Automation ProposalPart C – Project Plan.docx
Page  1A Payroll Automation ProposalPart C – Project Plan.docxPage  1A Payroll Automation ProposalPart C – Project Plan.docx
Page 1A Payroll Automation ProposalPart C – Project Plan.docx
alfred4lewis58146
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
lisandrai1k
 
Running head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxRunning head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docx
todd271
 
Project presentation
Project presentationProject presentation
Project presentation
AkhilAlex13
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
catheryncouper
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
eleanorabarrington
 
Scope Statement1Scope Statement10Scope StatementCP.docx
Scope Statement1Scope Statement10Scope StatementCP.docxScope Statement1Scope Statement10Scope StatementCP.docx
Scope Statement1Scope Statement10Scope StatementCP.docx
bagotjesusa
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
SII-News Letter - source_3Q15
SII-News Letter - source_3Q15SII-News Letter - source_3Q15
SII-News Letter - source_3Q15
THONG DUONG
 
MPPL Chapter 8
MPPL Chapter 8MPPL Chapter 8
MPPL Chapter 8
beiharira
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
Divya Tiwari
 
The Software Engineering Profession SWE311The Software Enginee.docx
The Software Engineering Profession SWE311The Software Enginee.docxThe Software Engineering Profession SWE311The Software Enginee.docx
The Software Engineering Profession SWE311The Software Enginee.docx
ssusera34210
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
FitCEO, Inc. (FCI)
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
FitCEO, Inc. (FCI)
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
Daljit Banger
 
SDM Term Project (DWMT Consulting)
SDM Term Project (DWMT Consulting)SDM Term Project (DWMT Consulting)
SDM Term Project (DWMT Consulting)
"Royce \"Trey\"" Duncan
 

Similar to Comparison ResultsThe two articles are 88 unique. Executive s.docx (20)

merged_document
merged_documentmerged_document
merged_document
 
project plan
project planproject plan
project plan
 
The Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docx
The Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docxThe Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docx
The Federal Open Market Committee (FOMC) will meet on Sept. 25th a.docx
 
Page 1A Payroll Automation ProposalPart C – Project Plan.docx
Page  1A Payroll Automation ProposalPart C – Project Plan.docxPage  1A Payroll Automation ProposalPart C – Project Plan.docx
Page 1A Payroll Automation ProposalPart C – Project Plan.docx
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
 
Running head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docxRunning head CIS 532 Term PaperAssignment 5 .docx
Running head CIS 532 Term PaperAssignment 5 .docx
 
Project presentation
Project presentationProject presentation
Project presentation
 
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Scope Statement1Scope Statement10Scope StatementCP.docx
Scope Statement1Scope Statement10Scope StatementCP.docxScope Statement1Scope Statement10Scope StatementCP.docx
Scope Statement1Scope Statement10Scope StatementCP.docx
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
SII-News Letter - source_3Q15
SII-News Letter - source_3Q15SII-News Letter - source_3Q15
SII-News Letter - source_3Q15
 
MPPL Chapter 8
MPPL Chapter 8MPPL Chapter 8
MPPL Chapter 8
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
The Software Engineering Profession SWE311The Software Enginee.docx
The Software Engineering Profession SWE311The Software Enginee.docxThe Software Engineering Profession SWE311The Software Enginee.docx
The Software Engineering Profession SWE311The Software Enginee.docx
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
A Brief Introduction to Enterprise Architecture
A Brief Introduction to  Enterprise Architecture A Brief Introduction to  Enterprise Architecture
A Brief Introduction to Enterprise Architecture
 
SDM Term Project (DWMT Consulting)
SDM Term Project (DWMT Consulting)SDM Term Project (DWMT Consulting)
SDM Term Project (DWMT Consulting)
 

More from maxinesmith73660

You have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxYou have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docx
maxinesmith73660
 
You have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxYou have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docx
maxinesmith73660
 
You have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxYou have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docx
maxinesmith73660
 
You have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxYou have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docx
maxinesmith73660
 
You have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxYou have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docx
maxinesmith73660
 
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxYou have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
maxinesmith73660
 
You have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxYou have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docx
maxinesmith73660
 
You have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxYou have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docx
maxinesmith73660
 
You have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxYou have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docx
maxinesmith73660
 
You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docx
maxinesmith73660
 
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxYou have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
maxinesmith73660
 
You have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxYou have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docx
maxinesmith73660
 
You have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxYou have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docx
maxinesmith73660
 
You have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxYou have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docx
maxinesmith73660
 
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxYou have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
maxinesmith73660
 
You have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxYou have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docx
maxinesmith73660
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docx
maxinesmith73660
 
You have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxYou have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docx
maxinesmith73660
 
You have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxYou have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docx
maxinesmith73660
 
You have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxYou have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docx
maxinesmith73660
 

More from maxinesmith73660 (20)

You have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docxYou have been chosen to present in front of your local governing boa.docx
You have been chosen to present in front of your local governing boa.docx
 
You have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docxYou have been charged with overseeing the implementation of cybersec.docx
You have been charged with overseeing the implementation of cybersec.docx
 
You have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docxYou have been commissioned to create a manual covering the installat.docx
You have been commissioned to create a manual covering the installat.docx
 
You have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docxYou have been challenged by a mentor you respect and admire to demon.docx
You have been challenged by a mentor you respect and admire to demon.docx
 
You have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docxYou have been chosen as the consultant group to assess the organizat.docx
You have been chosen as the consultant group to assess the organizat.docx
 
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docxYou have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
You have been assigned a reading by WMF Petrie; Diospolis Parva (.docx
 
You have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docxYou have been asked to speak to city, municipal, and state elected a.docx
You have been asked to speak to city, municipal, and state elected a.docx
 
You have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docxYou have been asked to provide a presentation, covering the history .docx
You have been asked to provide a presentation, covering the history .docx
 
You have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docxYou have been asked to organize a community health fair at a loc.docx
You have been asked to organize a community health fair at a loc.docx
 
You have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docxYou have been asked to explain the differences between certain categ.docx
You have been asked to explain the differences between certain categ.docx
 
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docxYou have been asked to evaluate a 3-year-old child in your clinic.  .docx
You have been asked to evaluate a 3-year-old child in your clinic.  .docx
 
You have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docxYou have been asked to develop UML diagrams to graphically depict .docx
You have been asked to develop UML diagrams to graphically depict .docx
 
You have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docxYou have been asked to develop UML diagrams to graphically depict an.docx
You have been asked to develop UML diagrams to graphically depict an.docx
 
You have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docxYou have been asked to develop a quality improvement (QI) process fo.docx
You have been asked to develop a quality improvement (QI) process fo.docx
 
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docxYou have been asked to design and deliver a Microsoft PowerPoint pre.docx
You have been asked to design and deliver a Microsoft PowerPoint pre.docx
 
You have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docxYou have been asked to be the project manager for the development of.docx
You have been asked to be the project manager for the development of.docx
 
You have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docxYou have been asked to conduct research on a past forensic case to a.docx
You have been asked to conduct research on a past forensic case to a.docx
 
You have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docxYou have been asked for the summary to include the following compone.docx
You have been asked for the summary to include the following compone.docx
 
You have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docxYou have been asked to be the project manager for the developmen.docx
You have been asked to be the project manager for the developmen.docx
 
You have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docxYou have been asked by management, as a senior member of your co.docx
You have been asked by management, as a senior member of your co.docx
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 

Comparison ResultsThe two articles are 88 unique. Executive s.docx

  • 1. Comparison Results The two articles are 88% unique. Executive summary Executive summary The management at ABC Company has tasked the ICT department to come up with a surveillance system that is aimed raising the level of internal security in the company. As the ICT department’s system analyst, I have to develop a work plan that will oversee the project from the first to the last stage. This paper outlines the vital steps in the project, the proposed budget for the projectproject, the deliverables and the measurements for the success of the project (Williams, 2005). The aim of the paper is to justify the viability of the project in meeting the specific needs of the company. The administration of ABC Company has burdened the ICT department to research and formulate a surveillance system which is targeted to raise the level of internal security of the company. In my capacity as the ICT department’s system analyst, I am bound to come up with the work plan which will act as a guide to the project from the initial stages to its completion. This paper bring out the important steps in the foresaid project, the proposed budget for the project as well as the deliverables together with the measurements for the project to go through successfully (Williams, 2005). The purpose of this paper is to validate and substantiate the feasibility of the project in the meeting the specifications of the company and its ability to meet the needs of the company. Recommend a project portfolio management method for your selected project. Recommend a project portfolio management method for your selected project.
  • 2. For purpose of this project, the applied project management method shall be pipeline management. Pipeline management method includes identification of a capital investment project and coming up with measurable deliverables which are to be met by the project. The application of company’s resources is both time based and objective based. In this project, the time frame is within the 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). The project management method that shall best suit the purpose of the project at hand is the pipeline management. This methodology involves the identification of a capital investment project and putting forth measureable deliverables that ought to be met by the project. More still, The application of company’s resources is both time based and objective based. In the project at hand, the span is limited to 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). Type of problem Type of problem Two main problems are to be solved by the development of the surveillance system; first, the company seeks to intensify internal security especially considering the high rate of crime and terrorism activity, and secondly, the system shall be used as a tool in internal controls and inspection program (Katalien, & Pieter, 2013). These two areas have been a challenge in the company especially the latter which has been affecting the production in the company. Installation of surveillance systems has been advocated for by the federal government in all corporations to ensure that a comprehensive approach to homeland security and international security. The major areas of concern which will be addressed once the
  • 3. surveillance system is implemented are the intensification of the internal security, bearing in mind that the crime rates are in the increase as well as terrorism activities and the second the system will find its application in internal controls and inspection programs (Katalien, & Peter, 2013). The two areas for a long time have been a problem facing the company particularly the later which has seen the company’s production dwindling. As thus, the installation of a surveillance systems is highly recommended by the federal government in all the corporate intuitions to make sure an extensive approach to not only homeland security, but also international security Requirements Requirements Below are the requirements for the project Following are the specifications of the project to be developed. • A camera surveillance plan which shows the locations where the cameras shall be located throughout the company’s premises • A camera surveillance plan. This is to show the positions throughout the company’s business. • Local area network which shall help the company to internetwork all the cameras and other gadgets within the organizationorganization. • Access to an internet such that all the cameras and other gadgets within the organization can be inter-networked- A local area internet is recommended for this purpose as it allows the use of Ethernet cable connection to the electrical appliances. • Enough cameras to be fitted in all the locations noted above (John, 2013) • Cameras- adequate in number to be fixed to all the locations within the company’s premise as specified there before( John,2013) • A database management system which saves the data that is captured by the cameras. • A system that shall be storing the data which is streamed in by the camera- a database management system is recommended for this purpose.
  • 4. • A remote server from where the cameras can be viewed • A network topology that has a central location with a remote server to enhance the viewing of cameras. • Wide area network to connect the surveillance cameras with the homeland security department or security firm (Daniels, 2014). • Connection to a Wide Area Network (WAN) so that the surveillance cameras are connected with the homeland security firm (Daniels, 2014). • A customized program which is used to capture data from the surveillance cameras, view selected data, store data in the database, among other artificial intelligence functions • An over the counter program(Tailored/customized) that will be utilized in the capture of data from the surveillance cameras, viewing selected data, storage of data in a database besides other Artificial Intelligence(AI) functions • Data connection cables used for the interconnection of the cameras with the remote computer (Williams, 2005). • Components of internet connectivity establishment. For instance, data connection cables used for interconnection to the cameras with the remote computer (Williams, 2005). • Back-up storage preferably a internet based virtual memory • Countermeasures against data lose such as back-up storage especially an internet based virtual memory. • System developer • Skilled individuals within the discipline of information and technology such as System developer and database designers. • System Management staff • Technical staff that will be tasked with System Management • Installation space within the company’s premises • Adequate space within the business organization to allow installation. • Piping system for the connections • Piping system for the connections that will be employed in system management. Proposed business problem solutions
  • 5. Proposed business problem solutions At the end of the project, the following business solutions shall be attained After the completion of the system development and its actual implementation, the company will have gotten mitigation to the various business problems earlier explored. The solutions are as outlined below. • Development of a program that helps in identification of potential damage to the premises, properties and the persons within the company by tracking the movements of all the persons within the company’s premises (John, 2013) • Potential damages to the premises, property and the employees within the company will be minimized as the developed program will be tracking the movements of all the people within and around the company’s premises (John, 2013) • Development of a program that shows the activities of the employees within the organization with an aim of measuring the individual production of the employees. This will help in ensuring optimum individual production for the employees • Establishment of a program that will be keeping track of all the activities of the employees within the organization with the key concern being establishing the production of employees. This will lead to each employee trying to optimize his productivity rate thus a rise in the production capacity. • Creating a network that connects the company’s security control with the homeland securitysecurity. This will help the company to access faster assistance from the department of homeland security should there be a security alert. • Beefing up of security. The network creation will connect the company’s security with the homeland security. This will facilitate the access of security assistance from homeland security by the company in the event of a security alarm. . • Reduction of the cost of inspection. The system developed at the end of this project will help in reducing the number of professional inspectors that are required in the production department of the company (Katalien, & Pieter, 2013).
  • 6. • Cost reduction in key areas such as the inspection fee since the number of inspection professionals required in the production department of the company will significantly be reduced in number once the system developed comes into operation. (Katalien, & Pieter, 2013). • The system that shall be developed at the end of the project shall help the company to reduce the losses that are related to poor surveillance like theft of property by company personnel, and, looses from acts of crime and terrorism. • Reduction of losses related to poor surveillance that leads to theft of property by company personnel, crime and terrorism activities once the system is developed in the long-run. The profits on the other hand will be maximized. • The company shall have reduced eventual liability in case such a foreseen crime occurs due to negligence. • The business premise will reduce eventual liability in the event of unforeseen crimes that result from negligence. State the vision and the goal of the project. State the vision and the goal of the project. Vision of the project Vision of the project The vision of the project is to ensure that ABC Company has a robust security and surveillance system that helps in attaining the company’s profit maximization goals and in ensuring that the company attains international risk management status. The goals of the projects are The vision of the project is to enhance the beefing up of the security of ABC Company .Besides, The surveillance system will be geared to nothing else but will help in attaining the company’s profit maximization goals and in making sure that the company attains international risk management status. • To ensure that within 21 months, the company has been able to come up with a robust surveillance system The goals of the projects are • To ensure that the capital that is allocated to the project is
  • 7. utilized optimally • To ascertain that within a span of 21 months, the company has been able to establish a robust surveillance system. • To ensure that all the surveillance related risks that the company faces have been dealt with comprehensively (Francesco, Robbert, & Francesco, 2013). • To spearhead optimal utilization of capital allotted to the project development process. Five (5) major deliverables of the project • To ensure a comprehensive coverage and dealing of all the surveillance related risks that the company faces (Francesco, Robbert, & Francesco, 2013). (A)Development of a surveillance system within the given time limit : Five (5) major deliverables of the project The surveillance system should be installed within the required time limit. This will assist the company to cut down on costs caused as a result of delays like payment made to those involved in its installation. The company’s staff will also have enough time to learn how to use the system hence reducing the costs incurred on training on how to use the system (Williams, 2005). (A) Development of a surveillance system within the given time limit : (B) Development of a database that coordinates the business activities and the security within the organization The surveillance system ought to be put in place within the required time limit. This will enable the company reduce on costs that result from delays suck as payment made to the technicians involved in the installation process. In spite of that, the company’s staff will have substantial time to learn how to use the system hence cutting down on the costs incurred on training on how to use the system (Williams, 2005). Business activities and the security of the organization should
  • 8. be coordinated to reduce chances of losses that may be caused as a result of theft by company’s employees or its potential customers. The coordination of these two activities will also reduce the threat of terrorist activities to the organization. This will ensure that the security of all individuals dealing with the company is guaranteed and thus enhancing the chances of the company’s growth (Katalien, & Pieter, 2013). (B) Development of a database that coordinates the business activities and the security within the organization Business activities and the security of the organization should be well connected to minimize chances of losses that may be caused due of theft by company’s employees as well as its potential customers. In addition, the coordination of the two activities will bring down the threat of terrorist activities to the organization- this will make sure that the security of all individuals dealing with the company is assured and thus improving the chances of the company’s expansion (Katalien, & Pieter, 2013). (C) Training of staff on the usability of the newly developed system (C) Training of staff on the usability of the newly developed system Training of staff on how to use the newly developed system prepares them to accept change instead of resisting it. Training will also improve service delivery to customers because transactions will be executed on a timely basis and according to customers needs and specifications. This will end up giving the company a competitive advantage over its competitors as a result of efficient delivery of services. Training of staff on the utilization of the newly developed system prepares them to induce change at the same time reducing chances of resistance. Also, the training will boost service delivery to customers as transactions will be executed on a timely basis and I accordance to customers’ needs and specifications. This will end up giving the company a
  • 9. competitive advantage over its worthy competitors- thanks to the improved delivery of services. (D) Ensuring that the company’s security control system is connected to the homeland security (D) Ensuring that the company’s security control system is connected to the homeland security While the company has the mandate ensuring that it has maximized its internal security control system, the homeland security agencies are more professional in the area and thus their impact in the enhancement of security is paramount (Francesco, Robbert, & Francesco, 2013). This projects target to control a system that connects the company’s security control system to the homeland securitysecurity so that data sharing on security matters can be faster, intelligent and uncompromised. Whereas the company has the sole responsibility of maintaining and maximizing its internal security control system, the homeland security agencies are more professional in the area and thus their overall effect in the enhancement of security is very important (Francesco, Robbert, & Francesco, 2013). This projects aims to control a system that connects the company’s security control system to the homeland security so that data sharing on security matters can be swift, intellectual as well as uncompromised. (E) To come up with a project whose benefits outweighs the cost of project development and implementation (E) To come up with a project whose benefits outweighs the cost of project development and implementation While development of a surveillance system is a vital step in the company’s strategic growth, the opportunity cost of the system is a prime consideration in measurement of the utility of the project. The benefits include; the reduced risk of theft and other security issues, the increment in production in the company, the reduction of the cost of supervision within the company and increased investment by third parties due to the increased
  • 10. confidence in the management among other direct and indirect benefits (Francesco, Robbert, & Francesco, 2013). Whereas development of a surveillance system is an important step in the company’s premeditated growth, the opportunity cost of the system is a major consideration in the overall determination of utility of the project. The doles are as follows; the reduced chances of theft and other security concerns, the increment in the overall productive capacity of the company, a reduction of the supervision cost within the company and increased investment by third parties as a result of the increased confidence in the management besides other direct not forgetting indirect benefits (Francesco, Robbert, & Francesco, 2013). Table containing the generic resources, people, equipment, and materials needed to undertake the project. Table containing the generic resources, people, equipment, and materials needed to undertake the project. The following table shows the utilization of generic resources, people equipment and materials in the different activities within the project Following is a table denoting the utilization of the generic resources, human resource, and equipment together with materials in different acts within the project. Determine the key success criteria for your project Determine the key success criteria for your project The success criteria for the project shall be based on the ability to achieve the projected deliverables of the project. Some of these shall include; Successful completion of the project purely lies on the ability to achieve the projected deliverables of the project. These incorporate the following determinants. • The completion of the project within the time limit of 21 months (John, 2013) • Completion of the project development within the limited span
  • 11. period of 21 (John, 2013) • Ability of the system to send real-time signals to various destinations including; the remote computer, the database and the homeland security systems. • Capability of the system to send real-time signals to various destinations such as the remote computer, the database and the homeland security systems. • Ability of the system developed to reduce the cost of production supervision and increasing the rate of staff performance in the organization (Williams, 2005) • If the system developed will reduce the cost of production supervision and at the same time increase the rate of staff performance in the organization (Williams, 2005) • The security of the system from external and malicious interference and lack of system redundancy. • Security concerns such as safeguarding the system from external and malicious interference and lack of system redundancy. Recommendations Recommendations The company shall require ensuring that the system that has been developed has been updated from time to time. I recommend that a system appraisal shall be carried out every two years to ensure that the developments in the field of Information technology and Camera Surveillance have been adopted and updated. Staff training to effect these changes shall also be required in the same time duration (Katalien, & Pieter, 2013). During the implementation phase cycle of the system development, the company is required to ascertain that the system that has been developed is update regularly. I recommend that a system appraisal shall be conducted fortnightly to ensure that the developments in the field of Information technology and Camera Surveillance have been adopted and up to date. To crown it all, staff training for the implementation these changes is too a necessary requirement
  • 12. during the same time span. (Katalien, & Pieter, 2013). Comparison Results The two articles are 88% unique. Executive summary Executive summary The management at ABC Company has tasked the ICT department to come up with a surveillance system that is aimed raising the level of internal security in the company. As the ICT department’s system analyst, I have to develop a work plan that will oversee the project from the first to the last stage. This paper outlines the vital steps in the project, the proposed budget for the project
  • 13. project, the deliverables and the measurements for the success of the project (Williams, 2005). The aim of the paper is to justify the viability of the project in meeting the specific needs of the company. The administration of ABC Company has burdened th e ICT department to research and formulate a surveillance system which is targeted to raise the level of internal security of the company. In my capacity as the ICT department’s system analyst, I am bound to come up with the work plan which will act as a g uide to the project from the initial stages to its completion. This paper bring out the important steps in the
  • 14. foresaid project, the proposed budget for the project as well as the deliverables together with the measurements for the project to go through su ccessfully (Williams, 2005). The purpose of this paper is to validate and substantiate the feasibility of the project in the meeting the specifications of the company and its ability to meet the needs of the company. Recommend a project portfolio managem ent method for your selected project. Recommend a project portfolio management method for your selected project. For purpose of this project, the applied project management method shall be pipeline management. Pipeline management method includes iden tification of a capital investment project and coming up with measurable deliverables which are
  • 15. to be met by the project. The application of company’s resources is both time based and objective based. In this project, the time frame is within the 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). The project management method that shall best suit the purpose of the project at hand is the pipeline management . This methodology involves the identification of a capital investment project and putting forth measureable deliverables that ought to be met by the project. More still, The application of company’s resources is both time based and objective based. In the project at hand, the span is limited to 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3
  • 16. months of performance measurement (John, 2013). Type of problem Type of problem Two main problems are to be solved by the development of the surveillance system; first, the company seeks to intensify internal security especially considering the high rate of crime and terrorism activity, and secondly, the system shall be used as a tool in internal controls and inspection program (Katalien, & Pieter, 2013). These two areas have been a challenge in the company especially the latter which has been affecting the production in the company. Installation of surveillance systems has been advocated for by the federal government in all corporations to ensure that a comprehensive approach to homeland security and international security. The major areas of concern which will be addressed once the surveillance system is implemented are the intensificatio
  • 17. n of the internal security, bearing in mind that the crime rates are in the increase as well as terrorism activities and the second the system will find its application in internal controls and inspection programs (Katalien, & Peter, 2013). The two areas f or a long time have been a problem facing the company particularly the later which has seen the company’s production dwindling. As thus, the installation of a surveillance systems is highly recommended by the federal government in all the corporate intuiti ons to make sure an extensive approach to not only homeland security, but also international security Requirements Requirements Below are the requirements for the project Following are the specifications of the project to be developed. Comparison Results The two articles are 88% unique. Executive summary Executive summary The management at ABC Company has tasked the ICT department to come up with a surveillance system that
  • 18. is aimed raising the level of internal security in the company. As the ICT department’s system analyst, I have to develop a work plan that will oversee the project from the first to the last stage. This paper outlines the vital steps in the project, the proposed budget for the projectproject, the deliverables and the measurements for the success of the project (Williams, 2005). The aim of the paper is to justify the viability of the project in meeting the specific needs of the company. The administration of ABC Company has burdened the ICT department to research and formulate a surveillance system which is targeted to raise the level of internal security of the company. In my capacity as the ICT department’s system analyst, I am bound to come up with the work plan which will act as a guide to the project from the initial stages to its completion. This paper bring out the important steps in the foresaid project, the proposed budget for the project as well as the deliverables together with the measurements for the project to go through successfully (Williams, 2005). The purpose of this paper is to validate and substantiate the feasibility of the project in the meeting the specifications of the company and its ability to meet the needs of the company. Recommend a project portfolio management method for your selected project. Recommend a project portfolio management method for your selected project. For purpose of this project, the applied project management method shall be pipeline management. Pipeline management method includes identification of a capital investment project and coming up with measurable deliverables which are to be met by the project. The application of company’s resources is both time based and objective based. In this project,
  • 19. the time frame is within the 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). The project management method that shall best suit the purpose of the project at hand is the pipeline management. This methodology involves the identification of a capital investment project and putting forth measureable deliverables that ought to be met by the project. More still, The application of company’s resources is both time based and objective based. In the project at hand, the span is limited to 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). Type of problem Type of problem Two main problems are to be solved by the development of the surveillance system; first, the company seeks to intensify internal security especially considering the high rate of crime and terrorism activity, and secondly, the system shall be used as a tool in internal controls and inspection program (Katalien, & Pieter, 2013). These two areas have been a challenge in the company especially the latter which has been affecting the production in the company. Installation of surveillance systems has been advocated for by the federal government in all corporations to ensure that a comprehensive approach to homeland security and international security. The major areas of concern which will be addressed once the surveillance system is implemented are the intensification of the internal security, bearing in mind that the crime rates are in the increase as well as terrorism activities and the second the system will find its application in internal controls and inspection programs (Katalien, & Peter, 2013). The two areas for a long time have been a
  • 20. problem facing the company particularly the later which has seen the company’s production dwindling. As thus, the installation of a surveillance systems is highly recommended by the federal government in all the corporate intuitions to make sure an extensive approach to not only homeland security, but also international security Requirements Requirements Below are the requirements for the project Following are the specifications of the project to be developed. IIM-I300 Management Information Systems (50 Points) Due 6/22 Assignment 2 Directions: Answer each question completely and in detail. If the question has a minimum word count, it is likely because it is a complex subject that cannot be fully addressed in fewer words. Cite your sources with in-text citations and references. 1. Research the Sarbanes-Oxley Act. Write a minimum of 500 words (this question only), cite your sources using APA 6th style and completely address the following: provide some background on the economic conditions in the US that led to this law.
  • 21. your answer. 2. Describe the relationship between information security policies and an information security plan. How are they different? What does each accomplish in an organization. Why are they important? 3. Describe in detail the five steps an organization must do to create an information security plan. 4. Provide a specific example for each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response. **Hint: Don’t just define them…suggest actual technologies/products for each of the six noted above (Two per area). 5. Describe the relationships and differences between hackers and viruses. Be sure to discuss the differences between white-hat hackers and black-hat hackers. Describe how viruses are transmitted. Name one major virus from the past 12 months that has been in the news and describe its impact on consumers and business.
  • 22. IIM-I300 SU2014 Assignment 1 Due 6/8 11:59PM 50 points Directions: Answer each question originally, completely and thoughtfully (these are essay questions, please treat them as such). Complete the assignment and upload (MS Word file attachments ONLY) to OnCourse Assignments (Assignment 1) by the due date. Be sure to cite your sources using APA 6th style. Missing or incorrect citations will result in a deduction of points. Each question is worth 10 points. Your Turnitin score must be at or below 40% or no credit will be given. Please see the syllabus located in OnCourse Resources for information on submitting late work. 1. Describe the information age. What is it and what are its defining characteristics? Describe the differences between data, information, business intelligence, and knowledge. Provide examples of each. 2. Explain systems thinking and how management information systems enable business communications. Provide an actual example from industry (research the subject on the web – provide your source(s)) where MIS enabled enhanced business communication. 3. Describe Porter's Five Forces Model in depth and explain each of the five forces. Give specific
  • 23. examples for each of the five forces. 4. Demonstrate how a company can add value by using Porter's value chain analysis (VCA) and define the various aspects of VCA. Note that VCA is NOT the same thing as Porter’s five forces (it is often used in conjunction with it). 5. Explain why competitive advantages are temporary. Research the web and provide two examples of the temporary nature of competitive advantage. Running head: INFORMATION TECHNOLOGY PROJECT PROPOSAL 1 INFORMATION TECHNOLOGY PROJECT PROPOSAL 5 Executive summary The management at ABC Company has tasked the ICT department to come up with a surveillance system that is aimed raising the level of internal security in the company. As the ICT department’s system analyst, I have to develop a work plan that will oversee the project from the first to the last stage. This paper outlines the vital steps in the project, the proposed budget for the project, the deliverables and the measurements for the success of the project (Williams, 2005). The aim of the paper is to justify the viability of the project in meeting the specific needs of the company. Recommend a project portfolio management method for your selected project. For purpose of this project, the applied project management method shall be pipeline management. Pipeline management method includes identification of a capital
  • 24. investment project and coming up with measurable deliverables which are to be met by the project. The application of company’s resources is both time based and objective based. In this project, the time frame is within the 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). Type of problem Two main problems are to be solved by the development of the surveillance system; first, the company seeks to intensify internal security especially considering the high rate of crime and terrorism activity, and secondly, the system shall be used as a tool in internal controls and inspection program (Katalien, & Pieter, 2013). These two areas have been a challenge in the company especially the latter which has been affecting the production in the company. Installation of surveillance systems has been advocated for by the federal government in all corporations to ensure that a comprehensive approach to homeland security and international security. Requirements Below are the requirements for the project · A camera surveillance plan which shows the locations where the cameras shall be located throughout the company’s premises · Local area network which shall help the company to internetwork all the cameras and other gadgets within the organization. · Enough cameras to be fitted in all the locations noted above (John, 2013) · A database management system which saves the data that is captured by the cameras. · A remote server from where the cameras can be viewed · Wide area network to connect the surveillance cameras with the homeland security department or security firm (Daniels, 2014). · A customized program which is used to capture data from the surveillance cameras, view selected data, store data in the
  • 25. database, among other artificial intelligence functions · Data connection cables used for the interconnection of the cameras with the remote computer (Williams, 2005). · Back-up storage preferably a internet based virtual memory · System developer · System Management staff · Installation space within the company’s premises · Piping system for the connections Proposed business problem solutions At the end of the project, the following business solutions shall be attained · Development of a program that helps in identification of potential damage to the premises, properties and the persons within the company by tracking the movements of all the persons within the company’s premises (John, 2013) · Development of a program that shows the activities of the employees within the organization with an aim of measuring the individual production of the employees. This will help in ensuring optimum individual production for the employees · Creating a network that connects the company’s security control with the homeland security. This will help the company to access faster assistance from the department of homeland security should there be a security alert. · Reduction of the cost of inspection. The system developed at the end of this project will help in reducing the number of professional inspectors that are required in the production department of the company (Katalien, & Pieter, 2013). · The system that shall be developed at the end of the project shall help the company to reduce the losses that are related to poor surveillance like theft of property by company personnel, and, looses from acts of crime and terrorism. · The company shall have reduced eventual liability in case such a foreseen crime occurs due to negligence. State the vision and the goal of the project. Vision of the project The vision of the project is to ensure that ABC Company
  • 26. has a robust security and surveillance system that helps in attaining the company’s profit maximization goals and in ensuring that the company attains international risk management status. The goals of the projects are · To ensure that within 21 months, the company has been able to come up with a robust surveillance system · To ensure that the capital that is allocated to the project is utilized optimally · To ensure that all the surveillance related risks that the company faces have been dealt with comprehensively (Francesco, Robbert, & Francesco, 2013). Five (5) major deliverables of the project (A) Development of a surveillance system within the given time limit : The surveillance system should be installed within the required time limit. This will assist the company to cut down on costs caused as a result of delays like payment made to those involved in its installation. The company’s staff will also have enough time to learn how to use the system hence reducing the costs incurred on training on how to use the system (Williams, 2005). (B) Development of a database that coordinates the business activities and the security within the organization Business activities and the security of the organization should be coordinated to reduce chances of losses that may be caused as a result of theft by company’s employees or its potential customers. The coordination of these two activities will also reduce the threat of terrorist activities to the organization. This will ensure that the security of all individuals dealing with the company is guaranteed and thus enhancing the chances of the company’s growth (Katalien, & Pieter, 2013). (C) Training of staff on the usability of the newly developed system Training of staff on how to use the newly developed system prepares them to accept change instead of resisting it. Training
  • 27. will also improve service delivery to customers because transactions will be executed on a timely basis and according to customers needs and specifications. This will end up giving the company a competitive advantage over its competitors as a result of efficient delivery of services. (D) Ensuring that the company’s security control system is connected to the homeland security While the company has the mandate ensuring that it has maximized its internal security control system, the homeland security agencies are more professional in the area and thus their impact in the enhancement of security is paramount (Francesco, Robbert, & Francesco, 2013). This projects target to control a system that connects the company’s security control system to the homeland security so that data sharing on security matters can be faster, intelligent and uncompromised. (E) To come up with a project whose benefits outweighs the cost of project development and implementation While development of a surveillance system is a vital step in the company’s strategic growth, the opportunity cost of the system is a prime consideration in measurement of the utility of the project. The benefits include; the reduced risk of theft and other security issues, the increment in production in the company, the reduction of the cost of supervision within the company and increased investment by third parties due to the increased confidence in the management among other direct and indirect benefits (Francesco, Robbert, & Francesco, 2013). Table containing the generic resources, people, equipment, and materials needed to undertake the project. The following table shows the utilization of generic resources, people equipment and materials in the different activities within the project Determine the key success criteria for your project The success criteria for the project shall be based on the ability to achieve the projected deliverables of the project. Some of these shall include;
  • 28. · The completion of the project within the time limit of 21 months (John, 2013) · Ability of the system to send real-time signals to various destinations including; the remote computer, the database and the homeland security systems. · Ability of the system developed to reduce the cost of production supervision and increasing the rate of staff performance in the organization (Williams, 2005) · The security of the system from external and malicious interference and lack of system redundancy. Recommendations The company shall require ensuring that the system that has been developed has been updated from time to time. I recommend that a system appraisal shall be carried out every two years to ensure that the developments in the field of Information technology and Camera Surveillance have been adopted and updated. Staff training to effect these changes shall also be required in the same time duration (Katalien, & Pieter, 2013). Running head: INFORMATION TECHNOLOGY PROJECT PROPOSAL 1
  • 29. Executive summary The management at ABC Company has tasked the ICT department to come up with a surveillance system that is aimed raising the level of internal security in the company. As the ICT department’s system analyst, I have to develop a work plan that will oversee the project from the first to the last stage. This paper outlines the vital steps in the project, the proposed b udget for the project, the deliverables and the measurements for the success of the project (Williams, 2005) . The aim of the paper is to justify the viability of the project in meeting the specific needs of the company. Recommend a project portfolio man agement method for your selected project. For purpose of this project, the applied project management method shall be pipeline management. Pipeline management method includes identification of a capital investment project and coming up with measurable deliverables which are
  • 30. to be met by the project. The application of company’s resources is both time based and objective based. In this project , the time frame is within the 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013) . Type of problem Two main problems are to be solved by the development o f the surveillance system; first, the company seeks to intensify internal security especially considering the high rate of crime and terrorism activity, and secondly, the system shall be used as a tool in internal controls and inspection program (Katalien, & Pieter, 2013) . These two areas have been a challenge in the company especially the latter which has been affecting the production in the company. Installation of surveillance
  • 31. systems has been advocated for by the federal government in all corporations to ensure that a comprehensive approach to homeland security and international security. Requirements Below are the requirements for the project · A camera surveillance plan which shows the locations where the cameras shall be located throughout the company ’s premises · Local area network which shall help the company to internetwork all the cameras and other gadgets within the organization. · Enough cameras to be fitted in all the locations noted above (John, 2013) Running head: INFORMATION TECHNOLOGY PROJECT PROPOSAL 1 Executive summary The management at ABC Company has tasked the ICT department to come up with a
  • 32. surveillance system that is aimed raising the level of internal security in the company. As the ICT department’s system analyst, I have to develop a work plan that will oversee the project from the first to the last stage. This paper outlines the vital steps in the project, the proposed budget for the project, the deliverables and the measurements for the success of the project (Williams, 2005). The aim of the paper is to justify the viability of the project in meeting the specific needs of the company. Recommend a project portfolio management method for your selected project. For purpose of this project, the applied project management method shall be pipeline management. Pipeline management method includes identification of a capital investment project and coming up with measurable deliverables which are to be met by the project. The application of company’s resources is both time based and objective based. In this project, the time frame is within the 12 months of developing the surveillance system, 2 months of pilot phase, 4 months of change over and 3 months of performance measurement (John, 2013). Type of problem Two main problems are to be solved by the development of the surveillance system; first, the company seeks to intensify internal security especially considering the high rate of crime and terrorism activity, and secondly, the system shall be used as a tool in internal controls and inspection program (Katalien, & Pieter, 2013). These two areas have been a challenge in the company especially the latter which has been affecting the production in the company.
  • 33. Installation of surveillance systems has been advocated for by the federal government in all corporations to ensure that a comprehensive approach to homeland security and international security. Requirements Below are the requirements for the project the cameras shall be located throughout the company’s premises internetwork all the cameras and other gadgets within the organization. (John, 2013)