StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Project Management Life Cycle - Example

Cite this document
Summary
The paper "Project Management Life Cycle" is a wonderful example of a report on management. Software projects warrant exceptional thought for looking after classification. The business case for any software projects will incorporate key business objectives whether the venture conveys an energizing new innovation or an ordinary yet fundamental move up to keep up big business profitability…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful

Extract of sample "Project Management Life Cycle"

Project management Name Course Tutor Institution Date Introduction Software projects warrant exceptional thought for looking after classification. The business case for any software projects will incorporate key business objectives whether the venture conveys an energizing new innovation or an ordinary yet fundamental move up to keep up big business profitability. IT project documentation likewise regularly incorporates close points of interest of system and frameworks building design that displays an appealing focus for hackers and industrial espionage. Fizzled changes to software frameworks can likewise affect accessibility and honesty. Unique thoughtfulness regarding reinforcements, retreat arrangements and security chances ahead of schedule in the undertaking will pay enormous profits when venture rollout leaves little time to consider how to fix the progressions made amid a Go-Live or respond to a startling danger event that may make frameworks go down, or cause data misfortune, breach or corruption. Project Management Life Cycle The project will be finished in four stages: Requirements Development, Software Design, Software Implementation and Software Testing stage. 1: Requirements Development Necessities Development was the first and maybe most critical period of our undertaking. Amid this stage we will direct week after week gatherings with the bank's illustrative to discover necessities of the undertaking in subtle element. Principle errands in this stage included prerequisite determination, hazard examination, setting up timetables, and choosing deliverables. A Use Case report and System Requirement Specification Document was readied toward the end of this stage to legitimately record the client's necessities. These reports were later explored by the venture supervisor before programming the product 2: Software Design In the wake of looking into the clients' necessities, the group will begin to take a shot at framework plan. Framework building design, database plan and experiments were resolved amid this stage. Furthermore, a point by point configuration was created toward the end of necessities investigation amid this stage which was to be utilized to add to the product. The execution and testing stages ran simultaneously and were iterative. The product will be created in 4 week after week cycles. Toward the end of each cycle a fresher variant of the product will be discharged and tried. 3: Software Implementation The IT group will add to the product utilizing the definite configuration made as a part of the Design stage. The advancement will be observed through week after week gatherings and utilization of the SharePoint server. Elements will be incorporated into the product incrementally. After the first form arrival of the product, testing will start and bugs found will be reported. In the wake of discharging one variant of the product, the group will take a shot at highlight increments and bug altering to be discharged in the resulting form. Subsequently the execution procedure will iterative and communicated intensely with the testing procedure 4: Software Testing Testing will be performed in parallel with code improvement. The designers will perform unit testing to guarantee a working code before a discharge and afterward a thorough framework testing will be performed by different individuals from the group. Client Acceptance Testing will likewise be directed at to get further input about the clients' desires and to gage the level at which they will be met. Project plan structure The Project Management Institute characterizes a venture as an iteratively expounded attempt and security ought to be considered inside of each PM process or stage. Security checkpoints assembled into the venture amid a few key procedures will guarantee progress toward the sought security end state at task closure (Project Management Institute, 2008). The best chance to guarantee secure undertaking conveyance exists in the early phases of the task amid starting and arranging. Starting in light of the end, i.e. the conveyance of a protected system, will maintain a strategic distance from expensive scope, spending plan and calendar sways. As indicated by Burke (2010), genuine business estimation of a security arrangement is the measure of danger moderation gave contrasted with the expense of arrangement execution and upkeep. This project of web based trading software which proposes to give a business power access to information may be actualized contrastingly if security is considered as a fundamental prerequisite of the last deliverables as opposed to an untimely idea to be tended to when security breaks happen after execution (Burke, 2010). According to a study by Ponemon Institute (2012), it was reported that the normal hierarchical expenses of reacting to an information rupture were $4.5 million and lost business costs because of reputational harm, and so forth spoke the truth $3 million. Project managers can put forth a persuading defense that security dollars will achieve more if security is heated into the web based software from the start, as opposed to connected as a Band-Aid to pass a review amid operational handoff, or more regrettable, spent to recuperate from harm after a security occurrence (Kerzner, 2001). The security impact analysis of the web based trading software as a feature of a cost benefit analysis ought to be executed at the start period of software project to settle on a sound budgetary choice. Security can be considered piece of the bigger Cost of Quality of the venture. Expense of Quality incorporates both precaution measures and the expenses of inability to make a quality item. In the setting of security, precaution measures incorporate pretty much everything that will be prescribed in this project, including planning, prerequisites gathering, change administration, risk administration, and education (Cleland and Gareis, 2006). Extra internal expenses will incorporate evaluation expenses to discover quality issues, for example, reviews, tests and inspections. The expenses of failure incorporate the expenses to recoup from a digital security occurrence like an information theft or loss. Those recuperation expenses would incorporate external costs of failure like loss of goodwill, lost deals, fines, obligation costs, examination of episodes and remediation and additionally internal costs of failure like squandered work, improve, and fizzled handoff to operations. Project stakeholders An impact vs. standard Interest stakeholder examination framework concentrated particularly on security contemplations of the web based trading software may be uncovering. As a project manager, there is need to Identify the bank's security office and see whether they have security approve deliverables for the task. The project manager ought to examine the support's security state of mind, particularly if there is expectation that the monetary allowance is lacking for security of the project. The project manager may need to move key players higher on the security interest scale, including the undertaking backer, specialized groups and operations staff. Contingent upon the supporting's convention association; he may relegate a standard rundown of security parts to venture colleagues. Including operations staff right on time in the task and requesting their information on security prerequisites amid arranging will minimize the danger of a minute ago security fixes as the framework moves into generation (Indelicato, 2011). Figure 1 Stakeholders Management Top management Top administration of the venture will incorporate the Reserve's president bank, VPs, executives, division supervisors, the corporate working panel, and others. These individuals will coordinate the methodology and advancement of the association. On the positive side, the project manager is liable to have top administration bolster, which implies it will be less demanding to select the best staff to do the undertaking, and obtain required material and assets; likewise perceivability can improve a venture director's expert remaining in the organization. On the short side, disappointment can be very emotional and unmistakable to all, and since the task is vast and costly, the expense of disappointment will be more significant than for a littler, less obvious undertaking. The project manager ought to Develop top to bottom arranges and significant points of reference that must be sanction by top administration amid the arranging and plan periods of the venture. Ask top administration connected with the undertaking for their data reporting needs and recurrence. Develop a status reporting approach to be appropriated on a booked premise. Keep them educated of venture dangers and potential effects at al Project team The undertaking group is comprised of those individuals devoted to the venture or obtained on low maintenance premise. As a project manager, you have to give administration, course, or more all, the backing to colleagues as they go about fulfilling their assignments. Working nearly with the group to tackle issues can assist you with gaining from the group and fabricate affinity. Demonstrating your backing for the task group and for every part will assist you with getting their backing and collaboration. Government Working in a reserve bank, the project manager has to deal with the regulators within the government as well as departments from the government. Stake holder management Regularly there is more than one noteworthy partner in the venture. An increment in the quantity of partners adds anxiety to the venture and impacts the venture's intricacy level. The business or passionate venture of the partner in the task and the partner's capacity to impact the undertaking results or execution methodology will likewise impact the partner multifaceted nature of the task. Notwithstanding the quantity of partners and their level of venture, the extent to which the undertaking partners concur or differ impacts the venture's intricacy (Indelicato, 2011). By leading a stakeholder examination, venture managers can accumulate enough data on which to manufacture solid connections – paying little respect to the contrasts between them. For instance, the needs and needs of an executive of promoting will be unique in relation to those of a boss data officer. Subsequently, the venture director's engagement with every should be distinctive also. Partners with money related concerns should know the potential return of the venture's results. Others will bolster ventures if there is sound confirmation of their quality to enhancing operations, boosting piece of the overall industry, expanding creation, or meeting other organization goals. Remember every partner's desires and needs all through every discussion, report or email, regardless of how easygoing or formal the correspondence may be. Keep in mind that the organization's advantages are more essential than any individual's – yours or a stakeholder's. At the point when compelled to pick between them, put the organization's requirements first Communication The majority of a project manager’s work amid the executing phase of the web based trading software needs to do with interchanges. Indeed, the Project Management Institute (2008) states that Correspondence has been distinguished as one of the single most compelling motivations for task achievement or disappointment. The communications arrangement is the initial move toward guaranteeing data security amid undertaking the web based trading software. A correspondences arrangement ought to incorporate not just the technique, recurrence and crowd for communication however might likewise consider rules and specialized principles for a wide multiplicity communication channels. Maybe the in all probability danger during the web based trading software is accidental information spillage by means of one of the bunch of correspondence channels that the project managers use each day (Indelicato, 2011)like various choices for report sharing including cloud cooperation, as well as the most up to date risk to data security, online networking. The perfect barrier against incidental information spillage is a project team that is mindful of the danger and uses secure data frameworks brilliantly. Fizzling that, security preparing may offer assistance. A correspondences' survey arrangement at a group kickoff meeting can set desires. Occasional audits of the arrangement will help colleagues to remember their basic part in undertaking security (Atkinson, 1999). Risk management Plan Risk Management regularly gets less consideration out of the 42 project management processes as compared to Estimate Costs or Make Work Breakdown Arrangement, however data security, and at last venture administration, are generally about risk administration. A malware assault could possibly happen within the development or trial of the web based trading software; the software resources might be or might not be accessible when planned; what amount of money and time ought to be devoted to decreasing the negative effect of an unverifiable occasion? Risk administration endeavors to qualify and measure potential effects and pick operational alleviation procedures (Indelicato, 2011). Subjectively, the bank may have specific dangers they have a tendency to stay away from; for instance, banks subject to HIPAA regulations will maintain a strategic distance from loss of secured information. Measuring security danger is much additionally difficult and various models and strategies are accessible (Aissa et al., 2011; Doherty and Fulford, 2006). Specialists outlining a web based trading framework will probably utilie more complex methods for risk examination than the project manager will use to oversee dangers to the venture, yet both parts of risk administration are key to fruitful task conveyance (Kerzner, 2001). Every IT security danger to the web based trading software may require custom assessments. As an illustration, consider the potential effect of an information break within the execution of the project. As indicated by the Association of Privacy Professionals, there are four components which are most essential in deciding the probability that a break of private customer information will bring about prosecution: type of the data, cause of the breach, proof of abuse and size of occurrence (Mitrakas, 2011). These four general elements might likewise be valuable for assessing the effect of a break for different sorts of IT information. More significant information, for example, record names and passwords or system points of interest will have higher effect than openly accessible email addresses. Data stolen by terrible on-screen characters will probably have higher effect than data accidentally misled. Data that is effectively abused will have higher effect than data stolen with no proof of purpose to abuse. Also, loss of bigger measures of information will be higher effect than littler measures of information (Atkinson, 1999). The Probabilistic Attack Graphsis a system created for measuring and looking at IT security danger levels which investigates assault ways through a system and applies probabilities that vulnerabilities can be misused. The Reasonable Risk Analysis and Threat Modeling Spreadsheet accessible on the SANS Windows Security Blog is a generally clear beginning stage for a project manager to rundown dangers and alleviations, and to gauge general danger to the web based trading software utilizing a some or all of seven variables including harm to notoriety and profitability, exploitability, and lawful obligation (Rice and AlMajali, 2014; Wang, 2014). Project schedule Project quality Modern web based software not just backing the presentation of and association with rich media pages, additionally the execution of business-discriminating procedures. Furthermore, online frameworks, and particularly RIA (rich internet applications), bear numerous parts of multi-resp. hypermedia frameworks. To accomplish, support, and upgrade the nature of such frameworks, quality administration and the reception of a fitting quality administration framework ought to be a vital choice of every association creating, keeping up, or working such a framework. Since electronic frameworks are fundamentally programming frameworks, all parts of programming quality administration additionally are appropriate to online frameworks. Furthermore, a few angles curious to the quality administration for electronic frameworks must be represented. Quality administration frameworks are a way to help associations in improving consumer loyalty. Clients require items with qualities that fulfill their needs and desires. These needs and desires are communicated in item determinations and by and large alluded to as client prerequisites. Client prerequisites may be indicated contractually by the client or may be controlled by the association itself. In either case, the client at last decides the item's agreeableness. Every phase of improvement will have no less than one formal checkpoint called a stage exit. At the point when a stage has been effectively left, it demonstrates that all draft deliverables because of date have been finished, every single exceptional issue have worthy activity arranges, and there is a sound arrangement for the rest of the undertaking (nitty gritty for the following stage). The venture's assigned approvers (signoff powers) must give a composed position of agree/non-agree at stage exit. All influenced utilitarian regions included in the undertaking likewise take an interest in and can give info to the stage exit. Quality Assurance for this venture will incorporate no less than one review of all present draft deliverables and chose work items in every phase of advancement. The surveys will guarantee that the set up framework improvement and task administration procedures and methods are being taken after successfully, and exposures and dangers to the present Project Plan are recognized and tended to. Figure 2 Project Schedule In conclusion the projects of developing a new and more secure web based trading software for a reserve bank is a project which is valuable for office scope preparing and dispersion procedure decision-making. It could be connected to the bank’s head office as well as other branches of the bank to take care of future demand prerequisites. References Aissa, A., Abercrombie, R., Sheldon, F., & Mili, A. (2011). Defining and computing a value based cyber-security measure. Information Systems And E-Business Management, 10(4), 433-453. http://dx.doi.org/10.1007/s10257-011-0177-1 Atkinson, R. (1999). Project management: cost, time and quality, two best guesses and a phenomenon, its time to accept other success criteria. International Journal Of Project Management, 17(6), 337-342. http://dx.doi.org/10.1016/s0263-7863(98)00069-6 Burke, R. (2010). Fundamentals of project management. Ringwood: R. Burke. Cleland, D., & Gareis, R. (2006). Global project management handbook. New York, N.Y.: McGraw-Hill. Doherty, N., & Fulford, H. (2006). Aligning the information security policy with the strategic information systems plan. Computers & Security, 25(1), 55-63. http://dx.doi.org/10.1016/j.cose.2005.09.009 Indelicato, G. (2011). Project management fundamentals: Key concepts and methodology, second edition. Proj Mgmt Jrnl, 43(1), 92-92. http://dx.doi.org/10.1002/pmj.20288 Kerzner, H. (2001). Project management workbook to accompany Project management, a systems approach to planning, scheduling and controlling, seventh edition. New York: Wiley. Labuschagne, C., & Brent, A. (2005). Sustainable Project Life Cycle Management: the need to integrate life cycles in the manufacturing sector. International Journal Of Project Management, 23(2), 159-168. http://dx.doi.org/10.1016/j.ijproman.2004.06.003 Mitrakas, A. (2011). Assessing liability arising from information security breaches in data privacy. International Data Privacy Law, 1(2), 129-136. http://dx.doi.org/10.1093/idpl/ipr001 Project Management Institute. (2008). A guide to the project management body of knowledge(PMBOK® Guide) (Fourth Edition). Newtown Square: Project Management Institute. Rice, E., & AlMajali, A. (2014). Mitigating the Risk of Cyber Attack on Smart Grid Systems. Procedia Computer Science, 28, 575-582. http://dx.doi.org/10.1016/j.procs.2014.03.070 Sääksvuori, A., & Immonen, A. (2005). Product lifecycle management. Berlin: Springer. Wang, C. (2014). A Network Security Risk Computation Approach Based on Attack Graphs. AMM, 644-650, 3174-3177. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3174 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Project Management Life Cycle Report Example | Topics and Well Written Essays - 2750 words, n.d.)
Project Management Life Cycle Report Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/management/2084978-project-management-assignment
(Project Management Life Cycle Report Example | Topics and Well Written Essays - 2750 Words)
Project Management Life Cycle Report Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/management/2084978-project-management-assignment.
“Project Management Life Cycle Report Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/management/2084978-project-management-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Project Management Life Cycle

Project Management at the University of South Australia

… The paper "project management at the University of South Australia" is a perfect example of a management research paper.... This report is about the project management of hosting a conference for the University of South Australia.... This conference will be an educational research conference for enhanced project management techniques.... The paper "project management at the University of South Australia" is a perfect example of a management research paper....
8 Pages (2000 words) Research Paper

What Is Project Management and the Main Phases of a Project Life Cycle

… The paper "What Is Project Management and the Main Phases of a Project life cycle?... The paper "What Is Project Management and the Main Phases of a Project life cycle?... Main phases of a project life cycle Heldman (2009, pp.... What is project management?... project management entails a discipline of organizing, planning, securing, and managing resources so as to attain particular goals.... The basic challenge involved in project management is to realize entire project objectives and goals while honoring predetermined constraints....
12 Pages (3000 words) Assignment

Activities of a Generic Project and the Skills of a Project Manager

It is extremely vital for the project management team to know each activity and its importance in project management.... The project management team is responsible for this activity because the resulting decisions affect the whole project.... The project management team must undertake other, several and vital activities.... n project management, justification is extremely crucial because it allows the project to run in a legal environment after the approval of the project charter....
9 Pages (2250 words) Assignment

Developing a Project Plan: Frozen Pizzas

… The paper “Frоzеn Рizzаs - Benefits of Establishing a Company, Overview of the project, Constraints, and Challenges Facing Frozen Pizza Company in Mena City" is a motivating example of case study on marketing.... The paper “Frоzеn Рizzаs - Benefits of Establishing a Company, Overview of the project, Constraints, and Challenges Facing Frozen Pizza Company in Mena City" is a motivating example of case study on marketing.... Winning in the marketplace means that businesses and project teams must build in a customer-focused strategy, identifying and exploiting the competitive advantage....
8 Pages (2000 words) Assignment

Implementation of ICT System in a Marston Lodge Hotel

… The paper 'Implementation of ICT System in a Marston Lodge Hotel" is a good example of a management case study.... The paper 'Implementation of ICT System in a Marston Lodge Hotel" is a good example of a management case study.... This has been found to be true especially in customer relationship management.... On the other hand, ICTs are seen to be overestimated and as a waste of resources in operational activities such as inventories, building automation, check-in and check out and cash management (Baggio 2004)....
9 Pages (2250 words) Case Study

The Common Reasons for Project Failure

… The paper "The Common Reasons for Project Failure" is an engrossing example of coursework on management.... The paper "The Common Reasons for Project Failure" is an engrossing example of coursework on management.... Projects fail at an astonishingly high rate leading to an increasing scholarly focus on project failure.... Projects fail at an astonishingly high rate leading to an increasing scholarly focus on project failure....
10 Pages (2500 words) Coursework

Challenges Associated with Watson Ltds Expansion Project

… The paper "Challenges Associated with Watson Ltd's Expansion Project" is a great example of a case study on management.... The paper "Challenges Associated with Watson Ltd's Expansion Project" is a great example of a case study on management.... Therefore, if Task A will start on 1/7/2013 which is DAY 1 and should be completed after 4 days then its completion or earliest finish date will be 1/10/2013 or DAY 4 of the project.... Similarly, if Task B will start after Task A is completed (which is 4 days since project start) and should be completed after 5 days then Task B's completion is DAY 9 of the project....
12 Pages (3000 words) Case Study

Design and Construction Phases of a Project Life Cycle

… The paper "Management through the Design and Construction Phases of a Project life cycle" is a great example of a report on management.... Being the project manager of the team, my main function is to ensure optimum performance for the team.... Figure 1: showing project's lifecycle Initiation Initiation is the first phase of the project.... The group is supposed to have set clear objectives that must be achieved by the end of the project....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us