Preview

CIS 348 ASSIGNMENT 1

Good Essays
Open Document
Open Document
960 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 348 ASSIGNMENT 1
1. Describe the different levels and types of resources required for producing each deliverable described in the assignment summary. The three levels of management required to produce each of the deliverables described are low-level management, middle-level management, and top-level management. Top-level managers are responsible for controlling and overseeing the entire organization and its operations. Middle-level managers are responsible for executing organizational plans, project management and communicating up and down the chain, and also complying with the company 's policies. These managers act at an intermediary or mediator between top-level management and low-level management. Low-level managers focus on controlling and directing production and efficiency. They serve as role models for the employees they supervise.

Project Stakeholders
Stakeholder Interest Influence Potential Conflicts Role Objective Strategy CIO High High Push communications/No engagement/No participation Project sponsor Successful delivery of parts on order and on time by using new ERP Sign off key decisions and phases/stages via existing channels Change Manager High High No engagement ERP Development Delivering ROI Partner in the development of new ERP and enhance communications Project Manager High High Pull communications Project Planning Maintain ability to continue business as usual and what potential impact on existing contracts Provide regular updates and express concerns Testing Team High Med No participation Parts Compliance with regulations and requirements Ensure project follows proper procedures. Call Centre Agents High Low No influence on software changes could affect end product resulting in failure or replacement Orders/Services Satisfy customers requests and orders via enhanced SCM along with improved ERP No action required

2. Explain how the data collected in the Project Stakeholders table could assist the project management



References: Letavec, C. (2008). Program Management Professional (PgMP). A Certification Study Guide with Best Practices for Maximizing Business Results. J. Ross, Publishing Inc. Retrieved from https://www.jrosspub.com/books/google.gr/books?isbn=193215986x.pdf Ritchie, M. (2008, November). IS Information Services: Project Stakeholder Engagement Overview and guidance. Retrieved from http://webcache.googleusercontent.com/search?q=cache:lH4T5sJ4IJ:https://www.project s.ed.ac.uk/webfm_send/127+&cd=3&hl=el&ct=clnk&gl=gr

You May Also Find These Documents Helpful

  • Good Essays

    The Nemours Children Hospital project was a finalist in the 2013 PMI Project of the Year awards. The Project management team was Stanley Beaman and Sears and it had a budget of $260 million dollars. The project management team kept their ethical guideline to build a hospital for children and their parents and remained within their stated budget. They kept in mind the fact that end it was a children’s hospital and kept that fact (beside the budget) uppermost in their mind. The result was a well thought out, beautiful, and functional hospital that has the health of children, both…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Referential Integrity empowers you to support a predictable and accepted database. For instance, in a patient database you may need to guarantee that no patients might be entered into the framework without an extraordinary patient ID. Else, you could wind up with a failure to rapidly record, sort and discover patients who have relating scenes of forethought, arrangements, authentic cases, and so forth.…

    • 1097 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    u07a2 Unit 7 Assignment 2

    • 1193 Words
    • 4 Pages

    Wallace Design Group owned by Kevin Wallace is an architectural services company. The location is in Farmers Branch, Texas. Kent Wallace, the marketing director, resides in California and remotely operates in the office. The organization is very small, yet group communication is very poor.…

    • 1193 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cis 210 Assignment 1

    • 917 Words
    • 4 Pages

    Information systems standardize and enforce rules on business transactions, which helps to ensure quality of both service and process. IS informs management of a business' health, mid-level managers of department needs and planning, employees of standard operating procedures, and customers of business services. IS also provides numerous communications tools for all levels of business, both for quicker collaboration and asynchronous discussions.…

    • 917 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. Which kind of profile would you most enjoy writ-ing? Or would you rather write something that falls between the two? Explain your choice.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996. The main purpose of this law was to improve the flow of health information. At this time, the great majority of the records were still in paper form, however there was a push for the healthcare industry to become digital. Prior to 1996, the only federal law that regulated the privacy of health information was the Privacy Act of 1974. Between 2003 and 2005, there were more than 13,000 privacy complaints, but no civil enforcement actions were brought by the HHS Office for Civil Rights (OCR). In that same period, there was only one HIPAA criminal action, against a lab assistant who used the personal data of a terminal cancer patient for identity theft. By 2008, 33,000 + complaints had been filed with OCR, only about 8,000 were investigated with 5,600 leading to corrective action, yet no fines had been issued. Several key dates for HIPAA since then are: February 17, 2009- ARRAs HITECH Act Signed into Law. HIPAA revised to strengthen enforcement penalties, require breach notifications, and expand patient rights 2009OCR increases HIPAA Enforcement January 25, 2013- HITECHs HIPAA Modification Final Rule Release There is no single part of the HIPAA complaint form that should be singled out for attention, other than simplifying the form completion instructions. In the situation where every instructor Brandon ford Mr. Redmond 1-14-2015 IS3350 and all associated staff had access to the students health care records, Premier College is in direct violation of HIPAA.…

    • 253 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Cis518 Assignment 2

    • 776 Words
    • 4 Pages

    This feature would be designed to register a new student to the web student registration system. Every new student who wants to have access to online registration for classes has to be a registered member of the system. This process is of high priority.…

    • 776 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Unit 6 Assignment 3.1

    • 1052 Words
    • 5 Pages

    Unemployment is a major issue in today’s society. Do you know what causes unemployment? Do you know who it affects? I do, let me tell you. Unemployment effects everyone, whether it be directly or indirectly. Even if you are employed, the unemployment of people in your community can hit home. As a public relations specialist I work with people on a daily basis to try to get them the assistance they need so that they can get better jobs. There are several causes of unemployment such as recessions, disability, attitude towards employers, willingness to work, employee values, and discriminating factors in the place of work such as age, class, ethnicity, and race. All of…

    • 1052 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Hierarchical Team

    • 1228 Words
    • 5 Pages

    There is a manager in each hierarchy who is called a middle manager who is in charge of their own department. This helps the department to be independent and therefore is able to deal with their own problems in their department without bothering what the other departments are doing. The manager who is in charge of this department is leads the department towards achieving team goals (Heckscher and Donnellon 1994). The manager is responsible of the whole department at large and in making sure that the team’s objectives are being achieved as well as the overall objectives of the organization. The middle managers communicate their progress to the overall team manager who is able to evaluate performance and decide if the team is achieving the intended objectives as well as the overall objectives of the organization.…

    • 1228 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Police Management Essays

    • 418 Words
    • 2 Pages

    The next level down from the Top Level is the Middle Management. This is where the Captains and Lieutenants of the department are found. They develop the plans, review reports, make recommendations of the reports, oversee equipment and records, and prepare schedules. They are the link between the First Level and the Top Level of management. They control the ultimate organization of the whole group.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays