StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Reducing Cycle Time in Corporations - Essay Example

Cite this document
Summary
The paper "Reducing Cycle Time in Corporations" discusses that the assessment of the risks for Hopkins Company will be done using qualitative risk assessment techniques. Since qualitative risk analysis is the most commonly used technique, also it does not engage predictions of loss…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Reducing Cycle Time in Corporations
Read Text Preview

Extract of sample "Reducing Cycle Time in Corporations"

Project Risk By Table of Contents Introduction 4 2. Key strategic consideration 5 2 Enhancing business Value 6 2.2 Effective information management 6 2.3 Better Estimates 7 2.4 Attracting new Clients 7 2.5 Marking Economic Predictions More Realistic 7 2.6 Enhancing Market Share 7 2.7 Introducing new trend 8 2.8 Taking competitive edge 8 3. Key risk management theories 8 4. Project environment 9 4.1 Geological environment (Individual Oil Well) 9 4.2 Economical Environment 10 4.3 Management Environment 11 4.4 Engineering Environment 11 5. Project planning 11 5.1 Time Planning 11 5.1.1 Gantt chart 12 5.2 Gantt chart 13 13 Cost Planning 13 5.3 Project Quality Plan 14 5.3.1 Quality Management Plan 14 5.3.2 Quality Review Chair 14 5.3.3 Main Responsibilities 14 5.3.4 Standards to be met 15 5.3.5 Project Monitoring and Control 15 5.3.6 Reporting 15 5.3.7 Reviews and Audits 16 We will establish a timetable of monthly review and audits for the overall developments in the PREsys system for Hopkins business project. In these circumstances we will provide a platform for the new system problem, views, and suggestions to effectively develop the project. 16 6. Risk management 16 6.1 Risk analysis for new IS 17 6.2 Classification of risk assessment techniques 19 Qualitative: The assessment of the risks for Hopkins Company will be done using the qualitative risk assessment techniques. Since the qualitative risk analysis is most commonly used technique, also it does not engage predictions of loss or numerical probabilities. On the other hand, this method engages defining a variety of threats, devising countermeasures should an attack take place, measuring the degree of vulnerabilities (TechTarget, 2009). 19 6.3 Project Risk Identification and Analysis 20 6.4 Risk Identification 20 6.4.1 Schedule Risk: 20 6.4.2 Initial Cost Risk: 20 6.4.3 System project Cycle Cost Risk: 20 6.4.4 Technical support Risk: 21 6.4.5 Overall risk of project failure Risk: 21 6.4.6 Feasibility Risk: 22 6.4.7 Technology Risk: 22 6.4.8 Security Risk: 22 6.4.9 Project Management Complexity Risk: 22 6.4.10 Additional Risks: 23 6.4.11 Specialist attention (Internal) Risk: 23 7. Conclusion 23 8. Bibliography 24 9Appendix 26 9.1. Appendix A 26 9.1.1. SWOT analysis 26 9.2. Appendix B 28 9.2.1. PESTEL analysis 28 1. Introduction At the present the corporations are coping with reduced cycle time. Here, the critical delay is between the idea and implementation. Thus, corporations need to continually adjust corporate operations to meet up new marketplace conditions. In addition, successfully handling and managing new information as well as establishing it all through the business is critical to handling and managing these challenges. However, constant, business-wide knowledge sharing has, consequently, turned out to be essential. In addition, businesses implement solutions to tackle and share knowledge. The mainly widespread preliminary application has been in the area of learning and training. Unluckily, customary classroom training programs are excessively time-consuming and expensive to facilitate businesses to deal out mission-critical information rapidly as well as efficiently (OneTouch, 2009). Efstathiades, Tassou, Antoniou, & Oxinos (1998) stated that businesses whose survival relies on maintaining new, modern, well-informed business information require a flexible knowledge sharing. Thus, the business-wide learning is immediately one advantage of a comprehensive business knowledge sharing. In case of new technology establishment at the business enterprise there is need to assess a lot of factors and issues regarding the corporate management and technology implementation. Since, modern and up-to-date tools and techniques are offering huge business advantages, however in some cases the development of the information system was not a successful experience. Therefore, by means of risk assessment we could be able to manage and handle business new technology system implementation successfully (Efstathiades et al., 1998). This report presents a detailed analysis of the new business technology systems establishment at Hopkins & Associates is a consulting engineering firm. 2. Key strategic consideration The business of Hopkins & Associates is a consulting engineering corporate. It is composed of gas and oil reservoir engineers who offer autonomous evaluations of the reserves intended for oil and gas properties. Similar to some accounting corporate that is auditing the books of some client of Stock Exchange, the Hopkins “audits” the gas and oil reserves for a given corporation plus issues a judgment as to their value (Davis, 2005). In addition, the Hopkins is having a computer services company. As a result, the engineers at Hopkins utilize a lot of engineering as well as geology software application to model as well as analyze the characteristics of gas and oil reservoirs. Furthermore, they as well utilize financial analysis using software tools to predict the economics intended for every individual gas or oil effectively being assessed by means of discounted cash flow examination. For the reason that of significance of computers in the foundation work of the corporate, the Board of Directors set up a separate company, an entirely owned subsidiary of the engineering corporation known as Hopkins Computer Services, Inc. The main intention of Hopkins Computer Services, Inc. is to offer the computer services required by the corporate. In addition, the computer corporation functions a huge distributed network by means of a contemporary computer center in Houston as well as various interconnected engineering workstations at the a variety of Hopkins offices (Davis, 2005). The head of Hopkins Computer Services, Inc. is Ken Summers who is a brilliant young petroleum engineer. Ken Summers has offered a new idea for the implementation of the new business technology system at corporation. The new technology system is aimed to enhance the corporate market position by offering new and better technologically supported facts regarding underground gas and oil reserves (Davis, 2005). The technology based system will be multi model system for the better corporate operational handling and tasks management. The main intention is to develop this system by linking all sub-models together into a huge centralized integrated decision support system for petroleum engineers (Davis, 2005). This new technology based system will offer a lot of new and better facilities. There a lot of economic considerations are attached to this new technology infrastructure. In the coming sections I will outline some of main and fundamental strategic considerations for new PREsys software implementation at Hopkins. 2.1 Enhancing business Value The implementation of new technology in every sector of life makes the overall functioning much easier. Thus, Hopkins business desired to implement new technology infrastructure for the potential enhancement in overall functions and operational handling of business. This will enhance the Hopkins business market value because Hopkins is implementing new technology that offers more accurate estimates and better estimations (Davis, 2005). 2.2 Effective information management As Tommy Smith stated that the business of Hopkins is making money through changing oil wells estimations those are established by client few years ago. In this scenario client again requests for some kind of estimation, thus, Hopkins team only re-evaluate the same wells with little effort through the available information extracted a few years ago. In case of new technology infrastructure establishment the process of overall information management will enhance (Davis, 2005). 2.3 Better Estimates The business of the Hopkins is mainly based on the better estimates. In case of new technology implementation the business will have more accurate and effective estimates that will enhance the business credibility in the market areas. 2.4 Attracting new Clients The next main intention of new technology establishment is to attract a range of new clients from all over the world. In addition, the new technology will offer faster and better business estimates in this way business will have more effective scope and market penetration. 2.5 Marking Economic Predictions More Realistic The new technology is aimed to enhance the working speed and accuracy besides this, the new technology is also incorporating more realistic and accurate economic estimations, so that client could better judge the present as well as future value of the particular oil well or whole oil filed. 2.6 Enhancing Market Share The new technology will enhance the customer circle of business and also offer better market share of business. 2.7 Introducing new trend The main intention of Hopkins oil and gas consultation is to throw a completely new idea in the market for the technological estimations and visualization of oil and their potential behaviors after excavation. 2.8 Taking competitive edge Taking a better competitive edge in market is also a main intention of the Hopkins business through this technology system implementation. 3. Key risk management theories In case of PREsys corporate technology system development we will use the dynamic risk management theory. In this scenario we will take a lot of precaution and corrective steps to avoid the potential risks of the business and its operational structure (Fehle & Tsyplakov, 2005). Some of steps are given below (United States Department of Agriculture, 2010): By means of stop-orders Partial investment (investing a quantity of the budget money) Managing emotions Trend-oriented trade In case of any business problem we are having following types of stops: Initial stop Trailing stop Withdrawal profit Timed stop To better handle and manage the overall project aspects we will follow the following given aspects of managing and handling the risks (Saunders, 2009); Structuring a hierarchy of objectives/criteria as well as alternatives. Evaluating, relatively the problem attributes comprising where essential levels of uncertainty. Synthesizing the outcomes by means of a common scale. Carrying out sensitivity analysis. 4. Project environment This section is about the analysis of new technology system (PREsys software) implementation at Hopkins business consultation and estimations. The new technology of PREsys software for the Hopkins business consultation and estimations is covering three main areas of the business and will have three main operating environments (Davis, 2005). 4.1 Geological environment (Individual Oil Well) Initially this new technology will manage individual reservoir under an oil field. This model would comprise information regarding the dimensions of the reservoir. Here main intention is to develop a three-dimensional map of the reservoir. This new 3-D map will offer the geology and chemistry of oil well. This model of overall PREsys software will be operating. In this scenario the new PREsys software will operative in following environments (Davis, 2005). Drilling Areas: System will record and manage the overall drilling tasks by presenting more accurate estimations. In addition, this environment of working of new PREsys system will deal with chemistry, biology and geological aspects of oil well (Davis, 2005). Excavating: The new technology system will also operate in scenario of environment new wells. This technology system offers better estimation and positions of better oil drilling through which client can easy drill the well to extract more better oil and gas (Davis, 2005). Geological estimation: In case of Geological estimations the new PREsys will record all the chemistry (soil type, rock structure, temperature, pressure readings, depth and quantity ) of well to draw a better 3-D sketch that offer inside view of the well with excavating the whole new well and spending huge investments (Davis, 2005). 4.2 Economical Environment The second model of the PREsys technology will operate in economical environment. In this scenario new PREsys is having following areas and operating environments (Davis, 2005): Discounted cash flow analysis: new PREsys will mainly perform the possible to estimate and predicts the how much money is required and how much to produce. For this it will incorporate the discounted cash flow analysis. That involves the future value and lifetime of that well. Cost Estimations: The new system will estimate the cost and offer better estimations for businesses. Working with realistic market environment: the main intention of new PREsys system is to incorporate effective and accurate cost estimations and future market conditions so that business could have more enhanced estimations and predictions in future. In this environment system will incorporate more realistic costs of oil business and market related aspects to offer more enhanced market estimations (Davis, 2005). 4.3 Management Environment The new PREsys system will be implemented at management areas. Thus, the management will take the decision about the system prediction and ground. 4.4 Engineering Environment In case of engineering environment the new technology platform will offer a better engineering support to the business. Since, this new technology will minimize the extensive work of engineering teams by offering a great variety of analysis tool those will be operated by adding new data into system. 5. Project planning The new project of PREsys will be developed to offer better business management and operational handling capability for achieving enhanced results. In this scenario there is need to plan the project in way that it could offer effective outcomes after its successful implementation. In this regard the new system time, cost and quality plan in given below. 5.1 Time Planning In case of time planning of new system for the new PREsys system, we need to consider the ground realities. In this scenario there is a vital need to incorporate all types of business and technological experts for the better prediction of system. In case of better time planning we need to assess the time aspects for the overall development. Here we are having three main modules those are tightly linked to each other. Each pervious module is working as an input platform for the next module. In this regard the new technology system (PREsys) will involve the following time plan (Gantt chart): 5.1.1 Gantt chart The Gantt chart is one of the most helpful techniques of demonstrating project schedule information, which was presented in 1917 by Henry L. Gantt, who was a pioneer in the scientific management field. However, the basic purpose of the Gantt chart is to demonstrate projected and real development for various activities presented as bars alongside a horizontal timescale. Since, it is extremely effectual and easy to understand technique of representing the actual present progress for each of a set of activities compared to the planned progress for each activity of the set. Thus, Gantt chart is very helpful for Hokins project in planning quickly, sequencing, and reallocating resources among activities, and also in the precious but routine work of keeping track of how work is going (Meredith & Mantel, 2006, p.380). As shown below: 5.2 Gantt chart Cost Planning Evidence In case of planning cost we are going to assess the market rates of resources. These costs are extracted from the generic cost those are available in the market. Sr. No Project Task and Resources Cost ($) 1 System Developer 60000 2 System Testers 25000 3 Quality assurance teams 25000 4 System Development software applications 50000 5 System Development Hardware 200000 6 Additional Cost (food, travel, electricity, place) 20000 7 Filed Surveys 20000 8 New Offices establishment 100000 Total $500000 As mentioned and allowed by the management the budget of this project is $500000. 5.3 Project Quality Plan This section outlines the project quality assurance plan. This section will provide a detailed overview of the software quality assurance for the PREsys system. Here we are aimed at implementing the Capability Level 2 in the requirements elicitation process. In addition, different quality assurance models will be employed depending on the marketplace objectives of the organizations. 5.3.1 Quality Management Plan This quality assurance plan will ensure that all requirements and established needs have been fulfilled as they were stated. Here we will plan the main quality parameters those will provide us basic scenario for the assessment of the main quality parameters. 5.3.2 Quality Review Chair In this project Mr. ABC will be the main project quality assurance manager. He will work and collaborate with the overall project team to assess the project quality to implement more effective system for enhancing the organizational performance. 5.3.3 Main Responsibilities In this PREsys system for Hopkins oil and gas consultant Inc. the project quality reviewer will be responsible for the following responsibilities: Project error detection and handling Reviewing of the overall project plan Analyzing the project requirements Checking the fulfillment of the each project requirements Making system more useable and easy use for the any type of user at oil filed Incorporating less complex system error detection and handling mechanism Better estimations about oil and gas Incorporating ground realities for prediction of oil and gas wells capacity Incorporating engineering and technology knowledge Making system alignment to market needs Facilitating feeds for current market status Economical estimations need to more realistic 5.3.4 Standards to be met For the PREsys system for Hopkins oil and gas consultant Inc. development and quality assurance we will require ensuring the project quality and implementing the effective standards those need to be met in a better way. Here we will follow and implement the European technology marketplace certification to IS0 9001for the software development. This system quality standard is the most frequently established quality program (Demirors et al., 1998). 5.3.5 Project Monitoring and Control In this project we will conduct periodic reviews. These reviews are the examination of the previously managed project and its outcomes. Thus, we would be able to measure the current position of the project. According to results of these reviews we will build the future plans and apply new and effective changes in our policy and strategy for the project plan. 5.3.6 Reporting Here we will establish reporting criteria that will ensure that each aspect of the new PREsys system for Hopkins business development is working properly and there is no conflict among different development areas. This reporting mechanism provides help to state any problem, difficulty, and hazard in the overall development of the PREsys system for Hopkins business. 5.3.7 Reviews and Audits We will establish a timetable of monthly review and audits for the overall developments in the PREsys system for Hopkins business project. In these circumstances we will provide a platform for the new system problem, views, and suggestions to effectively develop the project. 6. Risk management A risk is a quantity of the likelihood and outcome of not accomplishing an established project or business objective. However, there has been significant discussion regarding the appropriate definition for risk, but there is common conformity that risk always encompasses two features. The first feature of risk is known as “uncertainty”. According to this feature, risk may or may not occur; in other words, there are no 100% possible risks. And other feature is known as “Loss”. According to this feature, the risk becomes a certainty, unnecessary result or losses will take place. In addition, when risks are evaluated, it is essential to measure the degree of loss and the level of uncertainty linked with each risk (Kerzner, 2006, p.743; Pressman, 2001, p.146). Risk analysis is the procedure of analyzing and categorizing the dangers to businesses, individuals, and government agencies created by potential natural and human-caused unfavorable events. However, In IT, a risk analysis report can be utilized to support technology related goals with an organization’s business objectives. In addition, a risk analysis report can be either qualitative or quantitative (TechTarget, 2009; Padayachee, 2002). In the same way, risk management is the procedure of recognizing, measuring, and managing what might go in the wrong direction in a project before it turns out to be a danger to the successful implementation of the information system or the completion of the project. In addition, risk management is a very important skill to manage a project successfully (Whitten et al., 2000, p.83; Turban et al., 2005, p.712). This part of the report discusses about the risk assessment and management. This section will outline the main risks to the project of PREsys system for Hopkins business. In addition, these risks are mainly assessed via assumptions and dependencies in the overall development of project. Through the better management of these risks we will able to make this project a complete success. In the table below I have presented a detailed risk analysis of the PREsys system. I have listed them in each phase basis so that we could gain better understanding and mitigation of them. Furthermore, these risks are driven from the project analysis criteria. So the below given risk analysis and mitigation plan will be used during the implementation of this project. 6.1 Risk analysis for new IS In case of new information technology establishment at the PREsys system for Hopkins business, there is need to assess a lot of factors regarding the corporate management and technology implementation. However, information technology offers huge departmental advantages, but in some cases the development of the information system is not a successful experience. However, by means of better risk assessment organizations could be able to manage and handle organization new technology system implementation. The factors those can drive the vital need for the IS securities are (Shulman, 2006): Confidentiality Theft and fraud Privacy Integrity Database availability In the modern age of the information technology, there are many threats and security risks happened for the organizational information and personal information. Thus, there is need for a security model that has the ability to manage and secure organization’s information resources. However, the technical administrative safety /security measures like that security plans, actions and techniques are the mainly practices for the organizational information security measures. In addition, awareness of building actions are concerned with the organizations to a significantly smaller extent, on the other hand at the same time these are evaluated as being additional effective organizational procedures than technical administrative ones. Furthermore, the client information security and privacy are the most significant issues for any organization (O’Leary & O’Leary, 2007) and (Herold, 2007). There is need to apply the risk mitigation strategy regarding mitigation of potential risks of the business. In this scenario to effectively mitigate this risk there is need to allocate suitable funds to the overall project. In addition, there is need for appropriate planning for the better management and handling of the project (Pare et al., 2008). In case of information technology based system development for the Hopkins business that will also offer the services that include some of main risks regarding the technology we are going to implement. In this scenario the system which is going to be developed needs to be well known in marketplace so that we can have get consultation in case of any problem. However in case state-of-the-art technology implementation we can have less market awareness about the new technology platform that can lead us to problems regarding the new technology platform implementation. In case of such technology implementation we need to research the market for the better technology that can offer enhanced services to the organization. Thus, there is need to have awareness about the new technology available in the market for the better management of Hopkins oil and gas operations. This also offers us better awareness regarding the new technology available in the market (Bedard & Jackson, 2003). In case of this kind of risk there is need to recruit the well-educated human resource and development team for this project. Thus, there is need to deploy people who possess high development skills and better project management expertise in the respective area. This will offer better handling and management of the overall project and its operational aspects (Bedard & Jackson, 2003). The management of security can include the implementation of the security techniques to secure the PREsys Hopkins business network and corporate information. For instance, to manage network security, Hopkins’ business needs to develop network security policy that offers the help for the management of network security problem or difficulty. In addition, some antivirus software applications can be used to secure the network. However, for the data and information security, the techniques of data encryption can be used. 6.2 Classification of risk assessment techniques Qualitative: The assessment of the risks for Hopkins Company will be done using the qualitative risk assessment techniques. Since the qualitative risk analysis is most commonly used technique, also it does not engage predictions of loss or numerical probabilities. On the other hand, this method engages defining a variety of threats, devising countermeasures should an attack take place, measuring the degree of vulnerabilities (TechTarget, 2009). 6.3 Project Risk Identification and Analysis 6.4 Risk Identification 6.4.1 Schedule Risk: Any event scheduled in such a way that the place where it was needed but it was not there; this is a three model project, having a great deal complex structure so can take more time. Impact; High Category: Commercial Controlling Risk: More emphasis on the WBS (work break down structure) so that all the events are planned very well. 6.4.2 Initial Cost Risk: In this project we are using all new technology for oil and gas estimations so deciding initial cost of the PREsys development is not enough for the project handling Impact; Less Category: Commercial Controlling Risk: We have to see all deliverables and have a healthy work out on the cost estimation 6.4.3 System project Cycle Cost Risk: As I have stated that this is a huge project that covers oil & gas, economics, market, accounting and a lot of other areas so assigning cost to sub events could be increased in case of any problem and if one phase requires more budget Impact; Medium Category: Commercial Controlling Risk: Analyze the working of each phase and assign cost to each phase, also keep in mind any additional cost for the on work damage 6.4.4 Technical support Risk: This is a completely new project that incorporates 3-D modeling of overall oil and Gas wells so in its development any kind of technical support will not be available during the system development then in this scenario project could be in danger of failure Impact; High Category: Technical Controlling Risk: Gathering and taking necessary help during system development before system development 6.4.5 Overall risk of project failure Risk: Time and cost exceed risk (complexity of oil and gas handling areas) Category: Technical Impact; High Controlling Risk: Plan in such a way that all resources are applied efficiently 6.4.6 Feasibility Risk: The feasibility related problems during development phase of PREsys because of its highly complex structure Impact; Low Category: Technical Controlling Risk: Before starting the PREsys process system launch, project needs should be matched 6.4.7 Technology Risk: Any Technology risk because of use of more sophisticated technology Impact; Low Category: Technical Controlling Risk: Assign additional cost to the maintenance and consultation 6.4.8 Security Risk: Theft or damage to PREsys system project resource and assets Category: Technical Impact; Medium Controlling Risk: Adopt required security and safety steps for mitigation of such problems 6.4.9 Project Management Complexity Risk: Less involvement from the management in the project could cause project to failure Category: Commercial Impact; Medium Controlling Risk: Have day to day working report and progress management metrics 6.4.10 Additional Risks: Any additional risks regarding the project Category: Commercial Impact; Low Controlling Risk: Have a better risk management plan for mitigation of all these risks 6.4.11 Specialist attention (Internal) Risk: Adequate talent pool is not available in the area for the effective handling of this new kind of oil and gas management system Impact; Low Controlling Risk: there is need to establish better recruitment plans 7. Conclusion New technology implementation at Hopkins business is aimed to enhance business value in market place and gaining a better competitive edge in overall business areas. This research and analysis based report has offered detailed analysis of the new technology platform PREsys implementation at business working and operational areas or the business. However, this technology based system will be used for the predication of oil and gas well behaviour and economical value of well and oil & gas fields. In this scenario the present research and analysis report has offered a detailed overview of different aspects of this new technology based infrastructure implementation. In this report, I have presented the strategic business areas, business implementation environment, risk analysis, cost & time planning and quality assurance plan. I hope this report will be useful in providing insight to new technology system PREsys implementation at Hopkins business. 8. Bibliography Bedard, J.C. & Jackson, C., 2003. Information Systems risk factors, Risk Assessment, and Audit Planning Decisions. College of Business Administration. Davis, C.K., 2005. An Experiential Case Study in IT Project Management Planning: The Petroleum Engineering Economics Evaluation Software Imperative. Journal of Cases on Information Technology, 7(1), pp.1-21. Demirors, E., Demirors, O., Dikenelli, O. & Keskin, B., 1998. Process Improvement Towards IS0 9001 Certification in a Small Software Organization. In International Conference on Software Engineering, Proceedings of the 20th international conference on Software engineering. Kyoto, Japan, 1998. IEEE Computer Society Washington, DC, USA. Efstathiades, A., Tassou, S.A., Antoniou, A. & Oxinos, G., 1998. Strategic considerations in the introduction of advanced manufacturing technologies in the Cypriot industry. Technovation, 19(2), pp.105-15. Fehle, F. & Tsyplakov, S., 2005. Dynamic risk management: Theory and evidence. Journal of Financial Economics, 78(1), pp.3-47. Herold, R., 2009. The Definitive Guide to Security Inside the Perimeter. [Online] Available at: http://nexus.realtimepublishers.com/dgsip.php [Accessed 25 February 2010]. Kerzner, H., 2006. Project management: A systems approach to planning, scheduling, and controlling. New Jersey: John Wiley & Sons. Lane, G.T., 2009. Best Practices for Standards Communities. Computer, 42(7), pp.86-87. Meredith, J. & Mantel, 2006. Project Management: A Managerial Approach. 6th ed. Asia: John Wiley & Sons. O’Leary, T. & O’Leary, L., 2007. Computing Essentials.. New York, NY: : McGraw-Hill. OneTouch, 2009. Key Strategic and Functional Considerations in Choosing a Knowledge Sharing Solution. [Online] Available at: http://74.125.153.132/search?q=cache:k8aciB59H8UJ:www.onetouch.com/pdf/Key%2520Strategic%2520and%2520Functional%2520Considerations%2520in%2520Choosing%2520a%2520Knowledge%2520Sharing%2520Solution.pdf+Key+Strategic+and+Functional+Considerations+in+Choosing+a+Knowledge+Sharing&cd=1&hl=en&ct=clnk&gl=pk [Accessed 23 February 2010]. Padayachee, K., 2002. An interpretive study of software risk management perspectives. In ACM International Conference Proceeding Series; Vol. 30, Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology. Port Elizabeth, South Africa, 2002. South African Institute for Computer Scientists and Information Technologists , Republic of South Africa. Parr, G., Sicotte, C., Jaana, M. & Girouard, D., 2008. Prioritizing Clinical Information System Project Risk Factors: A Delphi Study. Proceedings of the 41st Hawaii International Conference on System Sciences. Pressman, R.S., 2001. Software Engineering: A Practicioners Approach, 5th Edition. London: McGraw Hill. Saunders, J.H., 2009. A Risk Management Methodology for Information Security: The Analytic Hierarchy Process. [Online] Available at: http://www.johnsaunders.com/papers/risk-ahp/risk-ahp.htm [Accessed 23 February 2010]. Shulman, A., 2006. Top Ten Database Security Threats. [Online] Available at: http://www.schell.com/Top_Ten_Database_Threats.pdf [Accessed 25 February 2010]. TechTarget, 2009. Risk Analysis. [Online] Available at: http://searchmidmarketsecurity.techtarget.com/sDefinition/0,,sid198_gci1182538,00.html [Accessed 25 February 2010]. Turban, E., Leidner, D., McLean, E. & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy. 4th ed. New York: Wiley. United States Department of Agriculture, 2010. CHAPTER 8 PART I. [Online] Available at: http://www.ocio.usda.gov/directives/doc/DM3540-001.htm [Accessed 23 February 2010]. Whitten, J.L., Bentley, L.D. & Dittman, K.C., 2000. Systems Analysis and Design Methods 5th Edition. New York: Irwin/McGraw-Hill. 9Appendix 9.1. Appendix A 9.1.1. SWOT analysis Here I will present the SWOT analysis of new technology system PREsys implementation at HOPKINS business, Strength The main strengths of new PREsys system for Hopkins business are: Better business support Effective operational support Enhanced predication of oil and gas wells Repaid management and handling of operations Quick response to client Better information processing Reliable data analysis Fast, accurate and automated data analysis Weakness In case of this new PREsys technology implementation for Hopkins business we are having following weak areas: More complex structure Long development time period Less match to geological aspects Less technical help available Less available technical pool for this system development Opportunity Here we are having following opportunities for new PREsys technology implementation for Hopkins business: Better market value Effective business share Introducing new way of estimations and predication in oil and gas business Attracting new customers Better market share Enhanced clients confidence Less time consumptions Threats Here we are having slowing threats regarding the PREsys technology implementation for Hopkins business: Long time delays because of complex system structure Risk exceeding project budget Exceeding time deadline Small error in estimation of oil and gas fields can lead to huge client damage that leads to extensive business degradation 9.2. Appendix B 9.2.1. PESTEL analysis Political Factors In case of new technology establishment at Hopkins business we will have some political aspects ahead. The main reason of emergence of political aspects is due to new technology that can remove or minimize some kind of personal authority in business. Economic Factors The new technology at PREsys is involving a huge significant of economical areas. The new technology will offer better business revenue and market value. Social Factors This new technology is incorporating an enhanced business social environment that facilitates better management of business operations and working areas. Technological Factors The new technology at business will offer an enhanced technological infrastructure that will include rapid, safe and quicker management of operations in the business areas. Environmental Factors The technology of PREsys is aimed to enhance the overall environmental structure of business that offers rapid response to clients and effective market share of business. Legal Factors New technology is aimed to enhance the business working power that also facilitates the legal predication of oil and gas field nature. This offers business a more feasible state of working and operational management in a more legal and effective way. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Project risk Essay Example | Topics and Well Written Essays - 3250 words”, n.d.)
Project risk Essay Example | Topics and Well Written Essays - 3250 words. Retrieved from https://studentshare.org/miscellaneous/1562911-project-risk
(Project Risk Essay Example | Topics and Well Written Essays - 3250 Words)
Project Risk Essay Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/miscellaneous/1562911-project-risk.
“Project Risk Essay Example | Topics and Well Written Essays - 3250 Words”, n.d. https://studentshare.org/miscellaneous/1562911-project-risk.
  • Cited: 0 times

CHECK THESE SAMPLES OF Reducing Cycle Time in Corporations

Premier Oil and Trends in the Oil Industry

Force Three: Supplier Power The suppliers' bargaining influence is low owing to the many corporations, which are frontrunners within the oil business.... The oligarchy system operates in favor of oil corporations, which provide distinct and exclusive products, which are 'green friendly' too to the surroundings.... With respect to the industrial life cycle, these techno-fixes represent the decline phase in which the industry may be supplemented by new substitutes....
5 Pages (1250 words) Essay

Cycle of Environmental Components

The paper "Cycle of Environmental Components" discusses that social contract places multinational corporations in an unusual position as they have to deal with the standards that have been established to govern business operations and at the same time attempt to perform beyond the governments.... Multinational corporations operating in such a country where social contracts dictate behavior are likely to be guided by self-interest and therefore to prevent this businesses are required to use their resources for the good of their position and to advance the position of the society in which they exist....
13 Pages (3250 words) Essay

Being Green: The Corporations Responsibility

This research paper describes the concepts of being green and it's association with favorable corporate image, cost savings as well as high profitability and the motivations issue, that has gained great attention from researchers in the past few decades.... ... ... ... This research paper not only reviews the motivations that are largely argued as the reason behind firms' willingness to go green, but also analyzes corporative image of the companies, it's financial and management strategies including the associated benefits of pursuing some of such strategies mentioned....
9 Pages (2250 words) Research Paper

Knowledge Management business and economy

The need for a Metadata Repository is recognized when the number of applications in an organization increases and the time to design these applications decreases.... This is made possible by the use of Metadata Repositories and Data Mining for logical, physical, and process aspects of the application environment, when tracking versions of the code and documenting all aspects of the application development life cycle.... In addition, enterprise impact analysis greatly reduces the analysis and maintenance phase of the development life cycle....
5 Pages (1250 words) Essay

Corporate Risk Management

This paper discusses the risk which corporations are exposed to.... Following this consideration, fires pose a risk to corporations and thus fire protection is quite critical in the modern era of highly dynamic consumerism patterns (Huang 2009).... Also, discussed are all of the elements in the risk management cycle associated with that mistake.... Managing risk is a cycle not necessarily geared towards eliminating the risk but ensuring that the losses that could be incurred in the event of a disaster are limited....
10 Pages (2500 words) Research Paper

Product Life Cycle

The product life cycle consists of four stages and is generally used by corporations as a gauge to keep track of their product performance.... It is not unusual for a corporation to be the only manufacturer developing the concept at this time as competitors attempt to save initial investment capital by allowing another company to pay for the test pilot.... This literature review "Product Life cycle" discusses how the different stages of the product life cycle can affect a business's cost recovery performance....
5 Pages (1250 words) Literature review

DELLs Strategy for Growth

The author states that the basic business model that Dell uses is the build to order manufacturing model known specifically for reducing costs through the buy on-demand features while allowing those in the corporation to have specific tasks oriented toward the model.... he basic business model that Dell uses is the build to order manufacturing model known specifically for reducing costs through the buy on-demand features while allowing those in the corporation to have specific tasks oriented toward the model....
14 Pages (3500 words) Assignment

Effects of the Multinational Cooperation on the development of the Gulf Cooperation Council

The purpose of this study is to determine the effect of Multinational corporations on the economic development of the Gulf Cooperation Council members.... The purpose of this study is to determine the effect of Multinational corporations on the economic development of the Gulf Cooperation Council members.... The purpose of this study is to determine the effect of Multinational corporations on the economic development of the Gulf Cooperation Council members....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us