CIS499 Information Capstone
Project Deliverable 2: Business Requirements
CIS499 Information Capstone
Introduction
InfoTech Company is a high-quality service that deals with collection and analysis of data. It has been in operation for less than two years. Companies involved in collection and analysis of data, monitoring the number of people who might have visited their sites, checking if the customers could have followed a link or went directly, if they used certain keywords to maneuver to the site or by any chance if they are unique, often use web analytics software to measure and analyze such concrete data that can otherwise be tiresome.The company intends to experience a growth of 20% within a span of one year increasingly.This rapid growth can only be realized if the current information systems requirements are redesigned to better systems that suit the functionalities of the organization. Since the company is relatively new with limiting technological infrastructure, it intends to hire some potential outsourcing and offshoring needs from other resourceful states (Tracey, 1994).
Describe and define the scope of the project
The scope of the project will entail task. Deliverables, goals, deadlines and costs. The objective of InfoTech Company is to design a quality information system that will meet the clients’ needs and expectations. The information system will be friendly and easy to use by the clients. The company will gather the requirements, analyze the data, design, develop an information system, implement, test and finally integrate that system by the guidelines and the schedule stated. The company will timely deliver the project to its clients so as to serve the purpose. The project is set to take three months. The cost of developing this application will amount to $5000 dollars. All the required documents and software needed will be delivered by the end of the first month so that no delays that will be experienced (Kehal, & Singh, 2006).
Speculate as to how to control the scope.
A control of the scope is done when changes occur in a project. Control includes comparing project’s state against the baselined information of the scope. This can be done through the schedule control, cost control, quality control and risk control. Schedule control involves determining of whether the schedule has changed. It is done so as to check if there is any changes that can be caused by vendors or whether they are controlled as they occur. Cost control entails monitoring the budget. The project’s budget is determined and in case the costs have elevated the corrective action is taken. Quality control involves monitoring whether the results that Jamii Bora company comply with relevant quality standards. The company therefore has qualitative engineers who work with the project manager in developing a management plan so they are well versed with sampling knowledge. (Tajts, T. 2012)
Identify possible risks, constraints, and assumptions.
Assumptions, is what the company believes to be true in future. They are based on knowledge and experience of the organization. The assumptions made in this company therefore are of great significance as they play a role in risk management plan. Constraints are limitations imposed by the organization or even the clients on the project.
Potential risks icludes malware. State-sponsored hackers, cyber criminals and spies may use attacks that may blend multiple tactics to penetrate organizations where they can steal sensitive data. Another risk is input injection. They include SQL injection targeting database systems and those targeting Big Data platforms. The attacks involves inserting unauthorized statements into input fields of the web applications. MySQL injections are attacked that involve inserting malicious comments into Big Data components. Constraints include cost. Purchasing of the required equipment and software is expensive. The company may be unable to purchase some of these equipment. Second constraint is the schedule risk. The company may fail to meet its target within the specified time. This is may be caused by limited resources such as cash due to poor budgeting. Assumptions may include time assumptions. This is the most significant assumption, and it is the most difficult to get it right. Every assumption mostly lies on time. A time delay assumption of not less than 20% should be added for unavoidable delays. Labor cost assumptions include the indirect and direct labor costs. This cost are based on the number of hours that each project team member will work which is multiplied by per hour wage (Kehal & Singh, 2006). Analytics is also used in this company to minimize the risk, to predict, to improve its performance and to monitor the software. There are three major types of analytics that are used. They include; software analytics that the company uses in the collection of information about its software, security analytics is the other type that analyzes security events and enables the IT staff to analyze events that pose the greatest risks hence enhancing the security. Finally, digital analytics is used to analyze, research and predict the company’s performance. (Kehal & Singh, 2006)
InfoTech has integrated new technologies such as hosted solutions, cloud computing. It purchases its software from its publishers using the hosted solution and installs at the data center where virtualized servers are setup. The company then implements the solution as it would do on its premises. The data is secure as there are backups and offers redundancy in case of a disaster. Cloud computing is beneficial as there are limited scalability and data is more secure. It is widely used in the big data companies though it’s not easy at times to take a cloud hosted application and later bring it back on-premise due to the distributed nature of the architecture. (Tajts, T. 2012)
Speculate upon potential outsourcing and offshoring needs
InfoTech Company is relatively new with limiting technological infrastructure it, therefore, has some reliable and perfect sources from Mexico. On the other hand, the organization offshores its activities in the very same country where it serves its customers with ease. In doing so, it has leveraged the cost of advantages, lowered the costs and taken the advantage of vendor’s expertise. As a result of the outsourcing and offshoring activities, they have attracted both merits and demerits. There are risks criticisms involved such as geopolitical risks, poor communication, and language barrier (Kehal & Singh, 2006).
Identify and justify the necessary resources including staffing that are necessary.
Resource requirements include supply of money, materials, staff, stock and other assets that can be drawn by Jamii Bora Company in order to function effectively. Staffing is a major resource in any given organization. It consists of three bodies namely; the employment agencies, human resource and recruitment body. The human resource planning body identifies what the organization needs in terms of the number and the skills and abilities of the employees so as to meet the job requirements. They also determine and allocate roles to those who are recruited. Human resource body also ensures that the organization is not going at a loss. (Tracey, W. R. 1994). Materials include servers to hold the data. network to connect the servers to the workstations, computers will be used to enter the information needed. (Tracey, W. R. 1994)
Relevant terms used in the project.
Database: a database is a list of data or information collected and organized in a manner that it can be accessed and managed.
Datawarehouse: This is a storehouse where the documents in an organization are stored.
Outsourcing: Outsourcing is acquiring goods and services from other suppliers outside or foreign supplies in the plan from an internal source.
Offshoring: offshoring is the relocation of organizations processes from one country to the other.
Staffing: Staffing is the process of acquiring, deploying and retaining a workforce of sufficient quantity and quality to create a positive impact on the organizational effectiveness.
Interface: an interface is a point where two systems meet and interact.
Conclusion
InfoTech Company will by the end of the be in a position to create a repository due to the efforts it has made to the incorporation of technologies and systems that aid in procuring a quality business requirement. Despite the risks and constraints that may be involved the organization is able to curb them use of the infrastructure and security measure that it outsources from Mexico.
References
Becker, S. A. (2002). Data warehousing and web engineering. Hershey, PA: IRM Press.
Top of Form
Project Management Institute. (2004). Newtown Square, Pa: Project Management Institute.
Top of Form
Kehal, H. S., & Singh, V. P. (2006). A socio-economic perspective. Hershey, PA: Idea Group Pub.
Tajts, T. (2012). Cloud computing security. Lexington, KY: CreateSpace.
Tracey, W. R. (1994). Human resources management & development handbook. New York: AMACOM.Bottom of Form