Project Management

  1. The network infrastructure is problematic in certain areas of the state, meaning that the existing infrastructure may not support the deployment of the e-mail system in all necessary areas.

This scenario presents a negative risk for the project management process. The installation of network infrastructure is intended to increase the number of users, and failure to reach critical areas presents a high probability risk for this process. The management will fail to realize a high priority objective in the project management process.  Therefore, the consequences of the risk are severe. The users targeted in this project are crucial areas that cannot carry out their activities without network infrastructure, which impacts on the ability to deliver quality services. A failure of the network system is a failure of the project altogether. Since effectiveness of the network system is mandatory, avoidance, transfer, and mitigation is an appropriate risk management strategy to realize this objective. It is important to acknowledge the challenges to be experienced in providing network infrastructure in various areas. In case it happens, transferring network services to other crucial areas helps in avoiding this risk or having appropriate resources to mitigate the risk is better. A project management tool to employ in this situation is simulation modeling (Gupta, 2013). A simulation model enables accurate representation of information in a hierarchical order and allows incorporation of information from a single infrastructure system to other networks and sub networks.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Several of the vendors have offered to develop specialized e-mail address books and templates for the state users, if their product is selected.

This is a positive risk for the project management process. The ability to increase network infrastructure in a particular market is a priority of the project, and to avoid potential problems like breakdown in network infrastructure in necessary areas, it is important to expand the number of users. Therefore, the risk probability is medium because increasing applicability of network infrastructure by selecting vendors ready to offer specialized email address book for users is an important step in increasing the number of users in the project.  In order to avoid risks involved with adding users through choosing vendors, exploiting, sharing, and enhancing is a crucial risk management strategy. However, the impact of the risk is high because it will take additional costs to set up email infrastructure for vendors, and vendors offering email services may compromise quality services. Therefore, it is important to adopt a IT cloud computing system for the vendors because through this software, the project will monitor on the vendors ability to ensure network security and privacy that may compromise quality services. Integrated reporting is an appropriate management tool to avoid this risk. The integrated reporting can be dramatically represented through a chart representing the identification, assessment, monitoring, review, and mitigation processes to monitor the email system of vendors (Alberts & Dorofee, 2004).

  • In the resource planning stage of the effort, you’ve identified that the project lacks two network engineers and a business analyst who would be responsible for project documentation.

This is a negative risk opportunity for the project management process. The installation of network infrastructure in crucial areas requires sufficient network engineers. This may involve additional costs to the project, but it important to ensure the provision of quality services to users. In the case of a business analyst, the availability of information is important in various project decisions and actions. Therefore, lack of networks engineers and a business analyst is a high priority risk for the project management and may have severe consequences on the process. Not only will it fail to offer quality services to users, the project managers will lack sufficient information to make crucial decisions needed to ensure efficient operation of the project. Therefore, the management should avoid, transfer, and mitigate this risk in order to avoid inconveniences, and the project can adopt a cost benefit analysis tool in order to determine the opportunity cost of forgoing an alternative.

  • The existing budget plan does not cover the anticipated 20% increase in licensing for one of the key candidate products under consideration (Globalcom).

  This is both a negative and positive risk opportunity for the project. Negatively, there is a likelihood of losing a potential key candidate product for the project thus additional costs for evaluating other alternatives. Positively, the project management avoids additional costs in terms of legal costs and implementation costs and focuses on necessary users for the network infrastructure.  This is a low priority risk because there is no urgency in making decisions about other considerations. Therefore, their consequence on the project management process is low. If the management focuses on the necessary users and candidates for products, it will avoid unnecessary risks incurred if another product candidate is included. A cost benefit analysis is important in order to determine additional benefits to expect from choosing a particular key candidate product (Gupta, 2013).

  • All the products under consideration for purchase offer more substantial discounts for more users. The statewide Ohio Department of Taxation is considering adopting one of these e-mail systems, as well.

This is a positive risk opportunity for the project management.  The consideration by Ohio Department to adopt one of these email systems is likely to increase availability of network infrastructure in many areas of the state. It is a high probability risk because adoption of email systems will expand the market and network infrastructure for the project.  Moreover, the consequences of the positive risk opportunity are low, but it is important to exploit, share, and enhance access to new users through this email system, and determine the Ohio Department’s ability to adopt this system. A PERT risk management software is necessary in mapping available network infrastructures in the state.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

References

Alberts, C. J., & Dorofee, A. J. (2004). Managing information security risks: The OCTAVE

approach. Boston: Addison-Wesley. Gupta, A. (2013). Risk management and simulation. CRC Press

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more