Preview

CIS 348 ASSIGNMENT 1

Good Essays
Open Document
Open Document
960 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 348 ASSIGNMENT 1
1. Describe the different levels and types of resources required for producing each deliverable described in the assignment summary. The three levels of management required to produce each of the deliverables described are low-level management, middle-level management, and top-level management. Top-level managers are responsible for controlling and overseeing the entire organization and its operations. Middle-level managers are responsible for executing organizational plans, project management and communicating up and down the chain, and also complying with the company 's policies. These managers act at an intermediary or mediator between top-level management and low-level management. Low-level managers focus on controlling and directing production and efficiency. They serve as role models for the employees they supervise.

Project Stakeholders
Stakeholder Interest Influence Potential Conflicts Role Objective Strategy CIO High High Push communications/No engagement/No participation Project sponsor Successful delivery of parts on order and on time by using new ERP Sign off key decisions and phases/stages via existing channels Change Manager High High No engagement ERP Development Delivering ROI Partner in the development of new ERP and enhance communications Project Manager High High Pull communications Project Planning Maintain ability to continue business as usual and what potential impact on existing contracts Provide regular updates and express concerns Testing Team High Med No participation Parts Compliance with regulations and requirements Ensure project follows proper procedures. Call Centre Agents High Low No influence on software changes could affect end product resulting in failure or replacement Orders/Services Satisfy customers requests and orders via enhanced SCM along with improved ERP No action required

2. Explain how the data collected in the Project Stakeholders table could assist the project management



References: Letavec, C. (2008). Program Management Professional (PgMP). A Certification Study Guide with Best Practices for Maximizing Business Results. J. Ross, Publishing Inc. Retrieved from https://www.jrosspub.com/books/google.gr/books?isbn=193215986x.pdf Ritchie, M. (2008, November). IS Information Services: Project Stakeholder Engagement Overview and guidance. Retrieved from http://webcache.googleusercontent.com/search?q=cache:lH4T5sJ4IJ:https://www.project s.ed.ac.uk/webfm_send/127+&cd=3&hl=el&ct=clnk&gl=gr

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Conducting actions irrelevant to their work, such as playing games, listening to music, watch videos, and etc.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    The Nemours Children Hospital project was a finalist in the 2013 PMI Project of the Year awards. The Project management team was Stanley Beaman and Sears and it had a budget of $260 million dollars. The project management team kept their ethical guideline to build a hospital for children and their parents and remained within their stated budget. They kept in mind the fact that end it was a children’s hospital and kept that fact (beside the budget) uppermost in their mind. The result was a well thought out, beautiful, and functional hospital that has the health of children, both…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The free group with two generators a and b is composed of all finite strings that are formed from the four symbols a, a−1, b and b−1 given that no a is directly next to an a−1 and no b is directly next to a b−1. Two such strings can be concatenated and converted into a string of this type by repeatedly replacing the "forbidden" substrings with the empty string. For example: abab−1a−1 concatenated with abab−1a yields abab−1a−1abab−1a, which contains the substring a−1a underlined in the example, and so the “forbidden” string gets cancelled and reduced to abab−1bab−1a, which again contains the substring b−1b underlined in the example, which then gets reduced to abaab−1a. It can be checked that the group formed from the set of those strings with…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    Setting /etc/vsftpd/ftpusers lists users that are not allowed to log in on the FTP server…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    IT302 assignment 5

    • 356 Words
    • 2 Pages

    d. If you want vsftpd to run in standalone mode, what do you need to set in vsftpd.conf?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Referential Integrity empowers you to support a predictable and accepted database. For instance, in a patient database you may need to guarantee that no patients might be entered into the framework without an extraordinary patient ID. Else, you could wind up with a failure to rapidly record, sort and discover patients who have relating scenes of forethought, arrangements, authentic cases, and so forth.…

    • 1097 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    u07a2 Unit 7 Assignment 2

    • 1193 Words
    • 4 Pages

    Wallace Design Group owned by Kevin Wallace is an architectural services company. The location is in Farmers Branch, Texas. Kent Wallace, the marketing director, resides in California and remotely operates in the office. The organization is very small, yet group communication is very poor.…

    • 1193 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cis 210 Assignment 1

    • 917 Words
    • 4 Pages

    Information systems standardize and enforce rules on business transactions, which helps to ensure quality of both service and process. IS informs management of a business' health, mid-level managers of department needs and planning, employees of standard operating procedures, and customers of business services. IS also provides numerous communications tools for all levels of business, both for quicker collaboration and asynchronous discussions.…

    • 917 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. Which kind of profile would you most enjoy writ-ing? Or would you rather write something that falls between the two? Explain your choice.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 4 assignment 2

    • 303 Words
    • 2 Pages

    After research and careful consideration of some of the other policies listed by other companies such as AT&T, Sprint, T-Mobile, and Verizon Wireless, Richman Investments has come up with the an acceptable use policy (AUP).…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hierarchical Team

    • 1228 Words
    • 5 Pages

    There is a manager in each hierarchy who is called a middle manager who is in charge of their own department. This helps the department to be independent and therefore is able to deal with their own problems in their department without bothering what the other departments are doing. The manager who is in charge of this department is leads the department towards achieving team goals (Heckscher and Donnellon 1994). The manager is responsible of the whole department at large and in making sure that the team’s objectives are being achieved as well as the overall objectives of the organization. The middle managers communicate their progress to the overall team manager who is able to evaluate performance and decide if the team is achieving the intended objectives as well as the overall objectives of the organization.…

    • 1228 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Police Management Essays

    • 418 Words
    • 2 Pages

    The next level down from the Top Level is the Middle Management. This is where the Captains and Lieutenants of the department are found. They develop the plans, review reports, make recommendations of the reports, oversee equipment and records, and prepare schedules. They are the link between the First Level and the Top Level of management. They control the ultimate organization of the whole group.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays