StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Degree of Inherent Risks in Projects - Assignment Example

Cite this document
Summary
The paper 'The Degree of Inherent Risks in Projects" discusses that outsourcing business strategies have numerous advantages for instance management of workers in information technology. In addition to that, reducing market time is another significant advantage of outsourcing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
The Degree of Inherent Risks in Projects
Read Text Preview

Extract of sample "The Degree of Inherent Risks in Projects"

Information technology Introduction Evidently, it is crucial to establish appropriate systems for the achievement of the intended goal. Consequently, following the covering of the different types of systems that exist, we are required to comprehensively give an account of the systems and subsequently answer the question below. Give an account of the degree of inherent risks in each type of project. In addition to that,give a brief discussion of the most suitable tool for each project and also support your argument of why the tool is most appropriate. Notably, system development projects are not successful following a number of factors. First and foremost, the deficiency in the commitment towards management is one of the core factors(information technology, 1). On the same note, since the authoritative figure of a project are tasked with the task of approving funds required to facilitate the project, their lack of commitment may result in complete failure of the project as a result of poor funding. Secondly, gutless estimations is another factor that has contributed to the failure of projects(McFarland, 290). Apparently, the project manager is mandated with the task of estimating the budget of the project. In addition to that, when the project manager is forced to compromise to a lower budget estimate by the senior manager a problem is bound to arise from this action. Consequently, as a result of poor funding as a result of reduced budgetary allocation, the project collapses. Furthermore, lack in control change is another factor contributing to the collapse of projects (information technology, 1) ). It is worth noting that, lack in appropriate change strategies may doom a project to failure as a result of serious cost overruns which eventually dim a project to its failure. In fact, with appropriate changes put in place a project is destined to thrive. In addition to that, poor project management has also played a crucial role in the demise of projects. On the contrary, project dimension has a huge significance in the risk factor of a project. Evidently, the project size is an important factor in the evaluation of the risk levels of a project (McFarland, 160). Apparently, the larger the project in terms of staffing and organization, the higher the risk factor of the project. Notably, projects with very high risk values are normally the projects that are the most profitable. Furthermore, experience with technology is another factor to consider in the evaluation risk related to a project. On the same point, it is worth noting that the more experience the organization is with the technology to be employed, the more successful the project is bound to be(information technology, 1). Apparently, the first and the second phases are usually hard to implement since the technology is still on the experiment stage as compared to the third and the fourth phases since the technology in place is well understood thus easily implemented. Moreover, another core factor in the evaluation of the project risk is the project volatility. Apparently, structure stability can be defined as the measure of the completeness and stability of a project to the project scope and specification ((McFarland, 150). In addition to that, the less defined the project is the higher the structure stability. Consequently, this implies that the higher the stability structure the higher the risk factor level of the project. On the other hand, there are four types of methods that can be employed in the management of the namely; external and internal integration, formal planning and formal result-control(information technology, 1). On the same note, the external and internal integration tool techniques come in handy in low technology structured projects since they are simple in structure and the technology here is basically experimental. However, for the case of high structure-high technology the tool of formal planning and formal result-control is the most appropriate due to the complexity of this particular project. Highlight the issues to be considered in incident management: before, during and after the incident. Apparently, some of the strategies to be considered before an incident are. First and foremost, sound design is a crucial factor for consideration(information technology, 1). In addition to that, discipline execution is another core part for the emphasis before the occurrence of an incident. Furthermore, it is essential to document carefully the strategies to be undertaken before an incident. On the same note, this is mandated to keep tabs and act as a form of reference in future. Moreover, the drafting crisis management procedures is essential before the happening of an incident(McFarland, 132). Actually, this is meant to prepare people for the incident. In addition to that, in a bid to anticipate the incident and avoid surprises, crisis management strategies are mandatory. Finally, the rehearsal stage is the final stage of the consideration stage before the happening of an incident. Apparently, this stage entails the execution of the plans documented earlier. On the other hand, the following are the considerations in the progress of an incident. On the same point, emotional response is the first stage of this response. Apparently, the action taken heavily depends on the kind of emotional response experienced(information technology, 1). Secondly, there is the wishful thinking stage which entails anticipation that the incident would have not happened, in other words, irrational thinking. In addition to that, politics is the other factor to lay emphasis on during an incident progress. Actually, this entails the determination of the cause of the incident without rationally verifying their judgment. Moreover, the ignorance of evidence is the other factor for consideration during an incident. In addition to that, the trigger of this response is to try lay blame(McFarland, 146). However, it is not usually the right choice. Last but not least, public relation is the other critical factor for consideration during the progress of an incident. On the same note, this entails the passing of information to the public regarding the incident. Apparently, this is usually to try and give an explanation to the cause of the incident and consequently, highlight the steps adopted to salvage the situation. Briefly evaluate the issue of security and piracy in relation to management of information technology as opposed to the need to protect personal information Apparently, it is essential to acknowledge the need to protect information in a bid ensure security of the information systems. On the same note, the backbone of the idea of governorship of information systems can be traced to a number of factors. First and foremost, the business value of information technology(McFarland, 196). In addition to that, information technology governance has served to unite both information technology and business. On the contrary, the issue of piracy has posed a big threat to the field of information technology. Furthermore, it has served to inhibit the security of information in the computer systems. Moreover, the most possible solution to this problem was to put in place measures to uphold the safety of information that is information technology governance. Secondly, the recognition of the impact of information technology is another core factor in the championing of information technology governance (Applegate, 354). Evidently, information technology has both negative and positive impacts in business. However, the incorporation of information technology in business has served to improve business through encouraging efficient and effective transfer of information thus boosting the business enterprises. In addition to that, information technology has facilitated the corporate governance and compliances (Applegate, 239). On the same point, information technology has played a major role in the implementation of corporate governance through the overseeing of corporate activities thus improving business enterprises. In summation, we can say that there is a need to protect personal information form piracy which threatens the security of information and consequently, hindering the growth of business enterprises. Outline the role of information technology function in each of the strategic quadrant sectors and the leadership consideration appropriate to each role. Evidently, information technology has played a significant role in firms. In fact, the application of information technology can be seen in four critical quadrants: support, factory, turnaround and the strategic quadrants(McFarland, 128). First of all, in the support quadrant, the utilization of information technology is relatively limited. Apparently, here the business enterprise does not depend entirely on information technology the operations of the business is thus less implication in the information technology sector (Applegate, 304). Secondly, in the factoryquadrat, information technology is heavily employed in this particular quadrant. On that note, the activities of the business ventures in this quadrant heavily depend on the information technology to facilitate their activities for instance the stock exchange businesses. Therefore, failure of the information technology systems will doom this business venture unsuccessful. Consequently, the need to promote information technology security. In addition to that, turn around quadrant is another important business enterprise that has not escaped the significant impact of information technology ((McFarland, 167). On the same note, it is worth noting that this form of business enterprises is transformational in nature. Finally, the strategic quadrant is another important quadrant in the field of business. Compare and contrast between the pressures towards user dominance of system development to the pressures of information technology control of the development Evidently, the pressures of information technology control of the development is more as compared to the pressures towards user dominance of system development (Applegate, 78). On the same point, with the current technological advancements, there has been an increased need to control information technology through curbing the instances of piracy among other vices ((McFarland, 150). To this end, it is essential to encourage this technological advancement to boost businesses enterprises. Account on the topic of outsourcing, types of outsourcing and the factor that influence outsourcing Notably, outsourcing business strategies has numerous advantages for instance management of workers in information technology. In addition to that, reducing market time is another significant advantage of outsourcing. On the contrary, outsourcing strategies are essential in the success of business. Notably, one example of outsourcing is the incremental outsourcing which entails the management of infrastructure(Applegate, 34) In conclusion, information technology has served to improve business and consequently, the other fields of the economy. To this end, there is a need to embrace this change. References Applegate, L., Austin, R., & Soule, D. (2009).corporate information strategy and management text and cases. (8th ed., p. 00).McGraw-Hill.  McFarlan, F. W. (1984). Information Technology Changes the Way You Compete,N Harvard Business Review. n/a: n/a.  Vogel,, l. H. (2006, June 23). peer and peer everyone gets to play. information technology. Retrieved May 17, 2008, from hUp:1Iwww.cio.com/article/244351 Peer_to_Peer_Everyone_Gets_to_Play.  Recipe for Good Governance. (2004, June 15). CIO. Retrieved February 16, 2014, from http://www.cio.com/article/29162/Recipe_for_Good_Governance. (information technology, 1) Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Degree of Inherent Risks in Projects Assignment Example | Topics and Well Written Essays - 1500 words - 1, n.d.)
The Degree of Inherent Risks in Projects Assignment Example | Topics and Well Written Essays - 1500 words - 1. https://studentshare.org/information-technology/1809407-exam-3
(The Degree of Inherent Risks in Projects Assignment Example | Topics and Well Written Essays - 1500 Words - 1)
The Degree of Inherent Risks in Projects Assignment Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/information-technology/1809407-exam-3.
“The Degree of Inherent Risks in Projects Assignment Example | Topics and Well Written Essays - 1500 Words - 1”. https://studentshare.org/information-technology/1809407-exam-3.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Degree of Inherent Risks in Projects

Risk And Project Management

hellip; All activities contain an element of uncertainty, particularly projects which are time limited and undertaken to arrive at a single goal.... Project definition and project life cycle The risks attendant to events management are of the same nature of risks to which all projects are subjected to.... Essentially, events are projects with a tangible beginning and end and dedicated to attain one result, and therefore follow the project life cycle development....
20 Pages (5000 words) Literature review

Risk Management

Although there are some cross-cutting risks across the phases, some are unique to each phase and hence it's often important to independently review the risks in each phase.... Infrastructure project Risks Risk management Name: Institution: Date: Infrastructure project Risks Construction projects are undertaken within sophisticated and dynamic environments and as a result they are often faced with elevated levels of uncertainty.... Internal risks are often within the projects control and as such can be eliminated or minimized through internal mechanisms....
10 Pages (2500 words) Essay

Establishing the Main Risks of Serious Problem Projects

A QUALITATIVE STUDY OF THE MAIN LIMITATIONS OF THE CYCLIC CAUSAL MODEL IN ESTABLISHING THE MAIN RISKS OF SERIOUS PROBLEM projects: VANCOUVER BUILDING PROJECT FAILURE  By: Affiliation) (Lecturer's Name) Acknowledgements I wish to acknowledge my supervisor, Mr.... Abstract The cyclic causal model is greatly reliable when dealing with serious problem projects (SSPs).... Correlation between projects Problems and the Cumulative Quantity Accelerating and Derivative Events 47 4....
57 Pages (14250 words) Dissertation

Starbucks Risk Management

Starbuck is committed in her strong values of ensuring equal treatment of individuals both with respect and high degree of dignity as well as conservation of the environment and this applies to their supply chain.... Starbucks Risk management Achievement of worldwide competitive advantage is what every business aims at, however there are risks associated with it.... Starbuck enjoys global flexibility that enables it to manage her risks particularly risks associated with global supply project....
4 Pages (1000 words) Essay

Financial Regulations in Financial Management

This paper under the headline "Financial Regulations in Financial Management" focuses on the fact that a Company's capital maintenance can be viewed from the two perspectives: Financial Capital Maintenance (FCM) and Operating Capital Maintenance (OCM).... hellip; OCM means the capability of the promoters to keep the system ongoing, so as to render productive services, and FCM means adding to the Net Worth of the Shareholders' Equity Capital Base....
10 Pages (2500 words) Assignment

Risk and Uncertainty in Project Management

The question of why risk and uncertainty are present in all projects to varying degrees will be raised.... What are the risks and uncertainty?... The concept of a 'sure thing' often flies in the face of reason and the speaker of that phrase has truly not considered all of the possibilities inherent in their proposal....
11 Pages (2750 words) Coursework

Value Management and Value Engineering

nbsp;There are also benefits to be considered in the variation, Value for Money is the term used to denote the degree to which an organization is able to obtain the maximum benefit possible from the services and goods it acquires and produces, given the resources within its control and which it can mobilize....
15 Pages (3750 words) Essay

Managing Contract Risks

The researcher of this essay will make an earnest attempt to explicate and present managing contract risks by identifying legal and alternative measures for a company to limit the risks in a project development out of contractual relations.... Legal luminaries interpose that parties to the contract must have a clear understanding of the nature of the contract, its inherent risks and probable measures to be adopted to mitigate negative impacts.... hellip; This research will begin with the statement that contract risks are inherent problems arising in contractual agreements between parties of interests of a specific development project....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us