Preview

Project Scope Ism450

Satisfactory Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Scope Ism450
Project Scope:
This project provides application through intranet, where employee could improve their health by registered the company-sponsored program via the company’s intranet. This project can help company to decrease the premium costs, increase employees health as well as saving for full-time employees over the next four years.

Project Time Frame:
This work will take six months from the day it’s initiated. There have 7 members in our project team. They are project manager Tony Prince, Programmer/ analyst, Network specialist, Business analysts, Human resources manager, and finance manager. The number of hours that they can be billed per week is 40 hours which mean they work for 8 hours per day and 5 days per week.

Work Breakdown Structure for Recreation and Wellness Intranet Project Prepared by: Adele Lim Date: 1 March 2004 1 Initiating 1.1 Develop weighted scoring model 1.2 Develop Business Case 1.3 Create Project Charter 2 Planning 2.1 Develop team contract 2.2 Develop stakeholder analysis 2.3 Develop scope statement 2.3.1 Define product characteristics and requirements 2.3.2 Define product deliverables 2.4 Develop WBS 2.5 Create Gantt chart and Network Diagram 2.6 Create Probability/Impact Matrix 3 Executing 3.1 Develop project Web Site 3.2 Project presentation 3.3 Create milestone reports 3.4 Develop project agenda 4 Controlling 4.1 Create new baseline 4.2 Update project charter and scope statement 4.3 Update contract and scope statement 4.4 Create monthly report 4.5 Update prioritized risk 5 Closing 5.1 Final project presentation 5.2 Prepare lesson-learned report 5.3 Prepare final project report 5.4 Create transition report 5.5 Update project Web

You May Also Find These Documents Helpful

  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Project Proposal Mis535

    • 405 Words
    • 2 Pages

    The company online presence is almost nonexistent and actually if the recommendation from an ex-employee is poor, not only it gives ATI a great disadvantage over their competitors, it also affects the company’s reputation with possible candidates and eventually with clients.…

    • 405 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Project part 1

    • 317 Words
    • 1 Page

    First off e-commerce is one of the best things for business whether you have your whole business through the web or partly. If you have a physical store, you are limited by the area that you can sell your product or offer service. An ecommerce website opens your business to the world. In addition to these two drivers,online retail is also driven by traffic from search engines. One of the most important positives of ecommerce is the lowered cost. A part of these lowered costs could be passed on to customers in the form of discounted prices. Advertising and marketing is global and you get a better buying market. For personnel use the automation of checkout, billing, payments, inventory management, and other operational processes, lowers the number of employees required to run an ecommerce setup. last but not least Real estate, the store does not need a prominent physical location. you can Locate the Product Quicker, eliminate travel time and cost, provide comparison shopping, also cross reference deals, bargains, coupons, and group buying.if you do open a e-business vulnerabilities that need to be taken into account if you decide to create an e-commerce site is security internal and external. Hackers attempting to steal customer information or disrupt the site or server containing customer information that is stolen. Also Imposters can mirror your ecommerce site to steal customer's money. authorized administrators/users of an ecommerce website downloading hidden active content need to watch the attacks on ecommerce system. Scans should be frequently done on your server. this will help identify any malicious programs that may be running worms, viruses or Trojan horses. Limited user access will ensure that you know exactly who has access to your ecommerce system and assign each user with unique access authentication method.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The IT department will begin a plan to develop a software to track employee benefits and reports on vacation/personal time available. This project will now be referred to from now on and on future documentation as “Employee Benefits Software Design and Implementation.” This project will consist of multiple phases including a planning stage, a design stage, a testing phase, an implementation phase, and a clean-up phase. The Employee Benefits Software Design and Implementation project will allow employers and employees to track all benefits, as well as make changes when open enrollment is available for healthcare, 401k, dental, health savings bank accounts, and vision benefits. They will be able to track all benefits from how much vacation and sick pay is available, paycheck stubs, change withholdings for 401k and HSBA. The stakeholders in this project will include:…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    [Replace this text with a high-level estimate of project team size requirements.] * [Consider the number and type of tasks to be performed, and the total effort required to complete them.]…

    • 885 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Course Project Charter

    • 567 Words
    • 3 Pages

    | 1. The project team should be staffed and ready by March 18, 2011, giving 1 month to prepare for the start of planning of construction, site procurement etc.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Is535 Final Course Project

    • 3651 Words
    • 15 Pages

    The first key to starting a successful online business is to first understand ecommerce and how it operates. Most people understand that ecommerce or electronic commerce refers to the buying and selling of products or services over electronic systems such as the Internet and other computer networks. However, it stretches beyond just the buying and selling of goods; it also includes an online process of developing, marketing, selling, delivering, servicing and paying for products and services. “The use of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction 's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices and telephones as well”. (Electronic Commerce, modified November 2011, Wikipedia). Today it is said to be over 29.7 billion pages on the World Wide Web. Ecommerce today has gained so much popularity because its core technologies are constantly evolving and keeping up with a technology based world. Each year the number of ecommerce deals grows tremendously. The sales volumes of on-line stores run in a more than comparable race with physical retail stores.…

    • 3651 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Your job is to allocate workers to tasks each week during the project. Planners ‘R Us has agreed to complete the project in 10 weeks (finishing two weeks before the Festival), and wants to minimize the costs associated with the project. All tasks A-K must be completed in 10 weeks. You have four (4) workers, although you do not need to use all of them every week – there are other tasks they can do in your company.…

    • 1009 Words
    • 5 Pages
    Better Essays
  • Good Essays

    * Time spent on project activities is approximately 370 minutes including going over project reports and preparing for weekly status meeting (25m), Progress review meeting (45m), Reviewing project assignment with Victoria (30m), listening to teammates (20m), Discussing problem with John (30m), negotiating with purchasing agent (30m), Conference call (60m), negotiating with Mary (40m), reviewing the impact the client’s requests (30m), Reviewing e-mails and project documents (30m), and Working with “what-if” scenarios (30m).…

    • 861 Words
    • 4 Pages
    Good Essays
  • Good Essays

    2. Scott and Associates, Inc. is a consulting firm that has 4 new clients. Based on different background and experiences of the leaders, the various leader-client assignments differ in terms of projected completion times. The possible assignments and estimated completion times in days are…

    • 807 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    The time I spent on this project in the HR department was for about 4 weeks.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This project the important of the employee welfare that have to be maintained in the organization.…

    • 838 Words
    • 4 Pages
    Good Essays

Related Topics