StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

A Risk Management Process within a Large-Scale Information Technology Project - Assignment Example

Comments (0) Cite this document
Summary
The author of this paper creates a risk management process within a large-scale information technology project. The E-Commerce project is creating an online shopping site for an existing enterprise, which will demonstrate the application of risk management.  …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
A Risk Management Process within a Large-Scale Information Technology Project
Read TextPreview

Extract of sample "A Risk Management Process within a Large-Scale Information Technology Project"

Download file to see previous pages A large-scale project is one that is complex in execution, thus requires a vast range of experts to oversee key areas. Within a project, three main areas portray risks; project environment, organization’s arrangement, and the external environment (Baydoun, 2011). The categories employed in evaluating the risk management process adhere to the Project Management Institute’s subdivision of the process that consists of risk management planning, risk identification, qualitative risk management, quantitative risk management, risk response development, and risk monitoring and control. It is obvious that any project will have risks, and the best way to deal with them is not to avoid but understand and control them.
The goals of this E-commerce project is to reach out to the fast-growing online market owing to the viral use of the internet today, which is estimated to have at least two-hundred million users. This is a rather potential trade opportunity, thus the need to develop an online (web) shopping site. The project, once completed, is bound to attract more potential clients, contribute to more efficiency in marketing and delivery, cut the management and overhead costs, and match the modern-day digital enterprise demands (“International Survey”, 2013). However, publishing an enterprise online has its own dangers in that the virility in internet use has led to the occurrence of online crimes and malpractices that can hinder or even derail an e-commerce project.
One, the internet being virtual, it enables hackers to gain access to online business sites and interfere with normal programming. Secondly, the transactions are virtual which leads to some clients not trusting such transactions, so they keep away from online stores. On the organization’s part, they might lack the expertise to run and maintain such a site since it requires personnel with the technicality in information technology systems.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Risk Management Process within a Large-Scale Information Technology Assignment, n.d.)
A Risk Management Process within a Large-Scale Information Technology Assignment. Retrieved from https://studentshare.org/management/1629033-risk-report
(A Risk Management Process Within a Large-Scale Information Technology Assignment)
A Risk Management Process Within a Large-Scale Information Technology Assignment. https://studentshare.org/management/1629033-risk-report.
“A Risk Management Process Within a Large-Scale Information Technology Assignment”, n.d. https://studentshare.org/management/1629033-risk-report.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF A Risk Management Process within a Large-Scale Information Technology Project

Information technology project management

..., Inspection and Variance analysis  The interviews shall inform us about the HRIS needs, Decomposition shall help us see the project deliverables into more achievable units, Alternative analysis shall make us capable to decide whether to proceed with the HRIS integration or not, Brainstorming shall bring fresh ideas as to the demands of the project, Inspection and variance analysis shall keep us on track as to the nature and extent of project activities as well as keeping them within boundaries Project Time Management  Decomposition, expert judgment, Dependency determination, floats, Three point estimating, Critical path...
18 Pages(4500 words)Assignment

How Information Technology has Improved Management Process

.... Kirchmer, 2010) Monitoring and control function of the management involves checking out on timely basis that the designed policies and procedures along with the hired resources are achieving the desired set of goals and objectives within the required time. Management has to be quite vigilant in the monitoring and has to perform constant appraisals and keep the human resources more and more motivated so as to contribute to the organization’s goals. The role that Information Technology plays in this regard is by streamlining the appraisals process, where in the past management has to manually go through all the complains,...
23 Pages(5750 words)Research Paper

Information Technology Project Management

...between technology and the people in their working environment. It therefore focuses on the related skills and methodology. It also focuses in the relevance of the general management in designing and processing information systems, and hence achievement of a successful design and promoting the innovation, thus meeting the organization objectives. A relevant principle of the social technical is within the philosophical values and premises. This greatly depends on the level of participation. Participation involves co-ordination of the process that exists between information systems experts and the other people at...
4 Pages(1000 words)Essay

Change management of large scale enterprise

...and that IT governance practices and IT outcome are correlated in the sense that stronger IT governance practices give better IT governance outcomes. Business enterprises in general are complicated entities that must incorporate technological and financial systems operating in a dynamic market and business circumstances that are not certain requiring change management from time to time. Most of these businesses are large-scale with a distributed system characterized by highly complex that involves the interaction of many aspects including humans, services, applications and devices. Due to this complexity, enterprises may have inefficiencies such as unnecessary human...
10 Pages(2500 words)Essay

Practical Risk Management with in Information Technology Project Management

...? Full Paper Introduction In many organizations the Project managers are gone with a discouraging task in order to successfully achieve, observe, and control the projects of all levels. In addition, these Projects may differ in size and can involve many persons from hundreds to thousands to accomplish the given task. In fact, Information technology projects contain huge budget and may take several years to complete the projects. In the project management procedure, the project manager has to perform several different roles together for...
5 Pages(1250 words)Research Paper

Large Scale Software Development

...The Large Scale Software Development College: 265452 The Large Scale Software Development The project and methodology Education is one of the most important sectors of the Kenyan economy. The country is a third world country but rapidly developing. For the country to grow economically there great needs that its citizens being educated. Provision of this vital resource will help her citizens acquire skills required for exploiting her vast resources amicably well. In the Kenyan nation, the system of education is 8-4-4, in this system of education the student's first enroll for primary education for eight years, then the next 4 years, they enroll for...
11 Pages(2750 words)Research Paper

Large Scale Software Development

...Large Scale Software Development of the Subject Name of the Concerned Professor 19 November 2008 Large Scale Software Development Though the digitization of the world economy has opened up the way for innovative opportunities and possibilities in the field of education, still the establishment of an 'Open University' style education facility in any region demands ample resources in terms of software and hardware inputs, internet connectivity and technical support. In this context, the Rift Valley province of Kenya stands to be a peculiar case. ...
3 Pages(750 words)Essay

Large-Scale Biomass Combustion

...obstacle in the large scale production of energy from biomass can be the inconsistent supply of feedstock. It has been viewed in this context that only 50% of the present availability of feedstock is being utilized in conducting various purposes. The incomplete utilisation of feedstock supply can become an obstacle in the energy production from biomass in terms of disposing considerable wastes (ECN, 2012). Energy Crops Another obstacle in the production process of energy from biomass has been identified to be the emergence of new crops that would be produced for non-energy as well as non-food reasons. These particular new crops may possess higher value as compared to biomass fuel that...
8 Pages(2000 words)Essay

Project Management for Information Technology

...is necessary for the short term as well as the long term success of these kinds of projects. The examples show that the complexity associated with the information technology projects can be managed to a high degree through the development of an appropriate culture within the organization and among its members. The report is concluded by summarizing the overall findings from the analysis of the theories and examples. The impact of organizational culture on Information Technology Project Management Organizational culture has emerged as an important perspective in the...
14 Pages(3500 words)Assignment

Information Technology Security Risk

..., as well as externally, within the network. Assets can be divided in to several different information technology environments. The physical infrastructure contains Servers, workstations, data centers, switches, routers etc. The core infrastructure contains virtual private networks, Microsoft active directory, domain controllers, email servers etc. The Internet infrastructure contains public cryptographic keys, training manuals, emails etc. 2 Risk Analysis Methodology The ‘www.businessdictionary.com’ defines risk analysis as “Relative measure of risk or asset value based on ranking or separation into descriptive categories such as low,...
13 Pages(3250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic A Risk Management Process within a Large-Scale Information Technology Project for FREE!

Contact Us