Final- Proj Risk

1. Provide an example of the upside of risk and explain the concept.

2. Explain how Enterprise Risk Management varies from traditional risk management?

3. What are fiev examples of internal and external drivers of an organization’s risk culture?

4. Provide an example company, give a description of the organization and its work area. Define what a SWOT is.  Perform a SWOT for your example company and rationalize each of the company characteristics you choose.

5. Explain what a KPI is.  How might we use KPI’s is doing a risk analysis for an organization.  Choose five KPI’s for the Amazon organization and explain why you have made your choices. 

6. Explain the Delphi Techniques.  How might it be used in comimg to consensus on risk identification related to an IT driven project?

7.  A popular hotel has continued to lose business in its room service food sales over the last five years.  Using the Six Sigma DMAIC process explain what you would do in each step of the process to improve the sales – provide relevant, practical details. What statistics would you apply and why?

8.  Explain the Plan, Do, Check, Act concept – provide a practical example.  How might it be applied in improving project quality?

9. Explain the concept of Continuous Improvement – provide an example. How might it be combined with a Lean approach

10. Explain the primary inputs and outputs in the Project Management Institute Quality Knowledge Area.

Provide a 10 page APA.

Discussion

 Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack). 

Apply: Signature Assignment: Choosing a Methodology

 

Assignment Content

  1. A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else involved a clear idea of what the project will entail in terms of effort, time, cost, and anticipated results. 

    The methodology or approach the project manager plans to use to manage the project must be identified before the project plan can be created. Choosing a methodology is important because a methodology provides the framework—that is, an overall process and suggested documents and deliverables—that will guide project development from beginning to end. Some project methodologies are more appropriate for some types of projects than for others. 

    Over the next few weeks you will develop pieces of a project plan. This week you will determine your methodology based on project requirements and the components needed in your plan.

    Read the Manage Your Health Inc. Case Study and complete the assignment below.

    Consider the differences between Agile and waterfall.

    Select 1 methodology to use for a project plan for this initiative.

    Create a simplified project plan such as the examples listed in the “Tips” section below. Include, at least, the following criteria:

    • Name of task
    • Duration
    • Predecessors
    • Notes
    • After completing your simplified project plan, write a 175-word paragraph and complete the following:
    • Define which methodology, Agile or waterfall, is most appropriate for this project. Why? Cite at least 2 sources to support your rationale.
    • Describe the following roles for this project: project manager, project sponsor, business analyst, and scrum master or program manager.
    • You may create your simplified project plan using Microsoft® Excel® or another software application of your choice. 

      Tips:

    • Research additional project plan examples online.
    • Consider the application characteristics and requirements when building your project plan. For example, the app will require a search feature so employees can search for available programs, will require security to protect personal information, etc., which will help with the Work Breakdown Structure (WBS). Note: This information will be helpful in the Wk 2 – Apply: Work Breakdown Structure assignment.
    • Read the 2 linked examples of project plans implemented as Microsoft® Excel® spreadsheets: Example Plan A and Example Plan B. Use these as guides in creating your own draft project plan. Notice the differences between these 2 examples in terms of length (overall and task length), structure of the work breakdown (iterative vs. non-iterative), and methodology. 
    •  

MIS433- Module 5: Developing Reports & Forms

Database Project Phase 4 Instructions

Following are instructions for Phase 4 of your Database Project. Remember that each phase is built on the instructor-approved outcome of the previous phases and reflects all recommended changes and corrections.  Please follow all submittal instructions listed below.

Phase 4:  Create Reports and Forms: In Phase 4 you will continue to work on your project using MS Access creating reports and forms as follows:

  • One form with a subform.
  • One form (or more) that facilitates data entry.
  • Minimum of two different reports. Incorporate features like columnar or tabular layout, grouping, summary, themes, etc.
  • Submit your MS Access database file (in Module 4).

Computer security

 Please see the attached files for the reference

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

clouding computing

Functional Requirements

1.Status inquiry•By  providing  package  number.  Users  of  this  system  will  be  able  to  inquire  the  detail  status  of  package they sent out or will receive.  •The status should include: route of shipment, shipping method, current location, and estimated remaining delivery time.

2.Input package information•At  the  beginning  of  a  shipment,  the  related  courier  will  input  the  information  of  the  package into  the  system.  The  information  should  include:  start  point,  route  of  shipment,  and  shipping  method. •By providing package number, the couriers will be able to access to the system and update the location of shipment during the shipping.

3.Management•The  administrator  has  ability  to  manage  (modify,  create)  the  username  and  password  of  each  courier. •The administrator can also access to the list of accounts.

4.Log in•Couriers and administrator should input their username and password before they operate the system.

5.Maintain package information•The system needs a database of information about packages and accounts.  

this a sample project. I need same bullet points but related to clouding computing.

Assignment

 This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.