Grin logo
de en es fr
Shop
GRIN Website
Texte veröffentlichen, Rundum-Service genießen
Zur Shop-Startseite › Informatik - Angewandte Informatik

Managing Projects in Information Technology

Titel: Managing Projects in Information Technology

Essay , 2017 , 20 Seiten , Note: A

Autor:in: Haitham Ismail (Autor:in)

Informatik - Angewandte Informatik
Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Information technology project management is different from normal project management due to the possible complexity it could be. It could vary from designing the infrastructure of a new building to developing a simple application. Its complexity comes from the fact that many teams can be involved (e.g. network team, software team, technical support, vendors, finance, etc.). In addition, the dynamic nature of the IT projects requires the project manager to be more agile to challenges that might come. In this article, we will have a situation from real life on how IT project manager will organize his project in all its stages, from project initiation to project close. It will show samples of reports that should be generated periodically to track the project execution.

Leseprobe


Table of Contents

Project Selection & Introduction

Skills, Roles and structure

Consultancy

Project Management

Final Thoughts

Appendix I – Pre-project network topology

Appendix II – Proposed Network design.

Project Goals & Themes

The primary objective of this document is to outline the strategic modernization of security infrastructure within a healthcare insurance organization. The work investigates how project management frameworks, risk assessment methodologies, and specialized team roles collaborate to mitigate cybersecurity threats, ensure regulatory compliance, and protect the organization's reputation and business processes.

  • Strategic assessment of IT security infrastructure and identification of vulnerabilities.
  • Application of project management methodologies (PRINCE2) and organizational structure analysis.
  • The impact of professional consultancy and team-based expertise on project success.
  • Risk assessment, cost-benefit analysis, and decision-making frameworks (e.g., Fishbone diagrams).
  • Development and execution of robust network topologies to ensure high availability and data integrity.

Excerpt from the Book

Consultancy

Usually, organisations use the services of consultant internally or externally for his expertise or additional management effort (Walker, 1997 cited in Brown, 2000), our team has a security architect hired to work with us during the period of the project, so we can consider him an external consultant. By his experience, skills, he bring confidence to the team and the company, he helped us during all project life cycle. As an advisor or consultant, he provides advancement across functions and department with no promotion aims by bringing thoughts and ideas from outside of the box to serve project objective and minimising the risk of project failure (Brown, 2000). His major input leads us assessing pre-starting situations (initiation phase) that established an understanding in identifying our weaknesses and painful area. Pre-starting activity like identifying the security gaps and the security controls that are suitable and enough for each area? In addition, he worked with project manager to interpret the scope of work into actions that need to be done and conducting a cost-benefit analysis. He works with IT governance specialist in identifying the current procedure, standards, and policies and determines what is needed to be added in order to comply with industries security standards.

Summary of Chapters

Project Selection & Introduction: This chapter introduces the project as a critical modernization of security infrastructure for a healthcare insurance company, highlighting the rationale for risk-based selection and regulatory compliance.

Skills, Roles and structure: This section details the functional organizational structure and the specific roles of the project team, emphasizing how specialized expertise contributes to overall project efficiency and internal knowledge sharing.

Consultancy: This chapter evaluates the strategic value of incorporating an external security architect to provide specialized guidance, reduce project risk, and offer objective assessment throughout the project lifecycle.

Project Management: This section explains the implementation of the PRINCE2 framework, the breakdown of the project scope into manageable units (WBS), and the utilization of communication plans to ensure project oversight.

Final Thoughts: This conclusion reflects on the project outcomes, analyzing successes and challenges, and provides practical recommendations for future project managers regarding resource management and knowledge transfer.

Appendix I – Pre-project network topology: This appendix describes the state of the network prior to the intervention, detailing the significant security gaps and the lack of robust infrastructure.

Appendix II – Proposed Network design.: This section presents the final network architecture developed to mitigate identified risks and enhance the organization's cybersecurity posture.

Keywords

Information Technology, Project Management, Healthcare Insurance, Cybersecurity, Risk Assessment, PRINCE2, Network Infrastructure, Security Controls, Data Breach, Consultancy, Cost-Benefit Analysis, Organizational Structure, Regulatory Compliance, Work Breakdown Structure, IT Governance.

Frequently Asked Questions

What is the core focus of this project?

The project focuses on the modernization of security infrastructure for a healthcare insurance organization to address cyber risks and ensure compliance with regulatory standards.

What are the primary thematic areas covered?

The document covers project selection, organizational structure, the role of consultants, project management methodologies like PRINCE2, and the technical aspects of network topology design.

What is the overarching goal of this work?

The primary goal is to successfully assess, design, and implement security controls that reduce cyber risks to an acceptable level while protecting organizational reputation.

Which methodology is utilized for managing the project?

The author utilized the PRINCE2 project management framework to gain control over the project life cycle and ensure structured progress.

What content is addressed in the main body of the document?

The main body examines the project initiation, the selection of team members and external consultants, the use of scientific decision-making tools like fishbone diagrams, and the practical execution of task-based workflows.

Which keywords define this document?

The document is best characterized by terms such as Cybersecurity, Project Management, Risk Assessment, and Network Infrastructure.

How does the author evaluate project success?

Success is evaluated by checking if project objectives were met, assessing resource utilization, ensuring the budget was not exceeded, and verifying the completion of the project schedule.

Why was an external consultant deemed necessary for this project?

An external consultant was hired to leverage specific expertise that was lacking internally, helping the team minimize risks and bring confidence to the project implementation.

What specific lessons did the author learn as a project manager?

The author learned the importance of including business-oriented team members in IT projects and the necessity of incorporating formal knowledge transfer and training into the project scope to avoid dependency on external contractors.

Ende der Leseprobe aus 20 Seiten  - nach oben

Details

Titel
Managing Projects in Information Technology
Hochschule
Anglia Ruskin University
Note
A
Autor
Haitham Ismail (Autor:in)
Erscheinungsjahr
2017
Seiten
20
Katalognummer
V461805
ISBN (eBook)
9783668969582
ISBN (Buch)
9783668969599
Sprache
Englisch
Schlagworte
managing projects information technology
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Haitham Ismail (Autor:in), 2017, Managing Projects in Information Technology, München, GRIN Verlag, https://www.grin.com/document/461805
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  20  Seiten
Grin logo
  • Grin.com
  • Versand
  • Kontakt
  • Datenschutz
  • AGB
  • Impressum