SEO for Desklib - Online Library for Study Material
Verified
Added on 2023/06/11
|11
|2457
|256
AI Summary
This portfolio showcases artifacts related to IT project management, including ERP implementation, data encryption, IT communications and training, database and project design, automated data analysis, and risk analysis and management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IT Portfolio Table of Contents Portfolio 1..............................................................................................................................................2 Name of the Artifact..........................................................................................................................2 Description of the Artifact.................................................................................................................2 Artifact & its Purpose........................................................................................................................2 Justification of the Artifact................................................................................................................2 Knowledge Gathered from the Discussion........................................................................................2 Knowledge Required to Implement the System.................................................................................2 Reflection..........................................................................................................................................2 Portfolio 2..............................................................................................................................................3 Name of the Artifact..........................................................................................................................3 Description of the Artifact.................................................................................................................3 Artifact & its Purpose........................................................................................................................3 Justification of the Artifact................................................................................................................3 Knowledge Gathered from the Discussion........................................................................................3 Knowledge Required to Implement the System.................................................................................3 Reflection..........................................................................................................................................3 Portfolio 3..............................................................................................................................................4 Name of the Artifact..........................................................................................................................4 Description of the Artifact.................................................................................................................4 Artifact & its Purpose........................................................................................................................4 Justification of the Artifact................................................................................................................4 Knowledge Gathered from the Discussion........................................................................................4 Knowledge Required to Implement the System.................................................................................4 Reflection..........................................................................................................................................4 Portfolio 4..............................................................................................................................................5 Name of the Artifact..........................................................................................................................5 Description of the Artifact.................................................................................................................5 Artifact & its Purpose........................................................................................................................5 Justification of the Artifact................................................................................................................5 Knowledge Gathered from the Discussion........................................................................................5 Knowledge Required to Implement the System.................................................................................5 Reflection..........................................................................................................................................5 1
IT Portfolio Portfolio 5..............................................................................................................................................6 Name of the Artifact..........................................................................................................................6 Description of the Artifact.................................................................................................................6 Artifact & its Purpose........................................................................................................................6 Justification of the Artifact................................................................................................................6 Knowledge Gathered from the Discussion........................................................................................6 Knowledge Required to Implement the System.................................................................................6 Reflection..........................................................................................................................................6 Portfolio 6..............................................................................................................................................6 Name of the Artifact..........................................................................................................................6 Description of the Artifact.................................................................................................................7 Artifact & its Purpose........................................................................................................................7 Justification of the Artifact................................................................................................................7 Knowledge Gathered from the Discussion........................................................................................7 Knowledge Required to Implement the System.................................................................................7 Reflection..........................................................................................................................................7 References.............................................................................................................................................8 2
IT Portfolio Portfolio 1 Name of the Artifact Advanced Information System Implementation – ERP System Description of the Artifact Enterprise Resource Planning (ERP) systems are the advanced process management and information system that integrate and automate the back-end operations carried out in an organization. Artifact & its Purpose Mesfine Industrial Engineering (MIE) Pvt Ltd is a medium scale Ethiopian organization that works in the area of metal construction and engineering and implemented ERP systems for enhanced technical automation and integration at the workplace ((Boltena & Gomez, 2012). Justification of the Artifact The artifact has been selected as it streamlines the technical processes and operations, introducesenhancedflexibilityandmobilityandalsopromotesthesecurityofthe information and data sets. Knowledge Gathered from the Discussion The implementation of an advanced system, such as ERP requires a phased approach of implementation with critical phases as planning, execution, control, and closure. It is necessary to plan the schedule and budget of the implementation process in advance. Knowledge Required to Implement the System The results of the feasibility and compatibility analysis, details of the technical infrastructure and estimations are required to implement the system. Reflection I learned the requirement and approach that shall be followed for the implementation of the advanced information system as ERP. I could also gain the understanding on the relevance of such systems in the medium and large scale organizations. The implementation process came up with the technical challenges and risks associated with information security and privacy. If given a chance, I would use advanced access control tools in the system before implementing the same. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT Portfolio Portfolio 2 Name of the Artifact Use of information encryption for risk management and mitigation in Cybersecurity & information assurance Description of the Artifact Encryption is the cryptographic method of encoding a piece of information in its cipher form for secure sharing and transmission. It has led to the preservation of information properties and has assisted in the process of cyber security. Artifact & its Purpose The Salvation Army in the UK has successfully used encryption process to safeguard the information sets and to protect the critical information from cyber risks and attacks (Ashford, 2011). Justification of the Artifact The artifact is selected as it promotes the ethical, legal, and organizational policies and standards and assures that the information properties, such as availability, integrity, and confidentiality are not compromised. Knowledge Gathered from the Discussion There are various cybercrimes and information security risks that have emerged with the increase in use of the cyber technologies and computing resources. The use of encryption is one of the risk prevention and mitigation measures that shall be adopted in the organizations and all of the cyber applications and systems. Knowledge Required to Implement the System The encryption algorithms, such as advanced data encryption, triple data encryption standard, and likewise shall be known. Also, the informationcategoryand the requirementof encryption shall also be known. Reflection I learnt the details of various encryption standards and the selection criteria that are adopted for choosing the encryption algorithm. There were challenges that came up in terms of implementation of the algorithm and the detection of the effectiveness of the same. I would use hashing algorithms as well from the next time on. 4
IT Portfolio Portfolio 3 Name of the Artifact IT Communications & Training Description of the Artifact Training manual is an on-paper or online guide that provides the detailed steps on the use of a specific system. IT communications that are followed in the organizations include emails, instant messengers, tele-conferencing mediums, SharePoint location etc. Artifact & its Purpose The IT communications and training manual are the basic blocks that are required for ensuringthattheproject-relatedandorganizationalrequirementsarecommunicated effectively (Toms & O'Brien, 2008). The training manual provides the guidelines on the best practices that shall be followed to use the system to gain fruitful outcomes. Justification of the Artifact The artifact has been chosen as the use of IT communications and training manual provides an easy mechanism for information sharing and transmission. There are varied forms that may be used in the process to meet the diverse needs. Knowledge Gathered from the Discussion Tele-conferencing mediums can be used for internal and external meetings to include and share information to the in-house and remote stakeholders and resources. The training manual may be published on the SharePoint location for easy sharing (Miri, Mansor, Chasempour & Anvari, 2014). Knowledge Required to Implement the System It is necessary to have an understanding of certain protocols, such as Simple Mail Transfer Protocol (SMTP), File Transfer Protocol (FTP), and likewise to implement the varied forms of IT communications. The training needs shall be assessed before creating training manual. Reflection The artifact provided the ability to understand the need of training and communications in the business organizations for streamlining of business operations. There were challenges in the design of training plan and schedule due to availability issues. I would use automated training assessment tools if provided an opportunity to carry out the task again. 5
IT Portfolio Portfolio 4 Name of the Artifact Database & Project Design Document Description of the Artifact Database is the back-end of the system and the design of the database and project can be explained and included in the design document using the diagrams as Use Case Diagram, Entity Relationship Diagrams, Data Flow Diagrams, Sequence Diagrams, and Activity Diagrams (Zheng, Feng & Zhao, 2014). Artifact & its Purpose Project design is a critical phase and the design document can provide the in-depth details of the database design and project architecture to assist the project resources in the development and execution activities. Justification of the Artifact The artifact has been selected as it will provide the project resources with the ability to carry out effective system design for smooth development and maintenance. The design diagrams provide a blueprint of the system to be developed. Knowledge Gathered from the Discussion System design is a critical project phase and it must be carried out using design diagrams and automated design tools. The flexible and scalable design must be developed for enhancing the system flexibility (Ali, Shukur & Idris, 2007). Knowledge Required to Implement the System It would be essential to have the database requirements and the details of the front-end technology being used. The requirements specifications and the business case must also be known. Reflection The artifact provided a chance to gain an understanding on the details of the design diagram and the database properties. There were security challenges and risks that came up in the process. The use of advanced security controls and tools would be used the next time. 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT Portfolio Portfolio 5 Name of the Artifact Automated Data Analysis and Decision Support Systems Description of the Artifact The automated data analytics tools and decision support system gather and integrate the information sets to provide patterns, trends, and statistics for efficient decision-making. Artifact & its Purpose The purpose of the artifact is to streamline and simplify the decision-making activities carried out in the business organizations. Justification of the Artifact The artifact has been selected as it provides the ability to make automated decisions quickly and with lesser scope of error. The results of automated data analytics tools may be used in the process of decision-making (Gray & El Sawy, 2010). Knowledge Gathered from the Discussion Data analytics tools may be used and applied on structured, unstructured, and semi-structured data sets. The decision support systems are the information systems that provide decisions on the basis of the organizational data and information (Abbaszadegan & Grau, 2015). Knowledge Required to Implement the System Organizational data and information sets are required for the implementation of these systems. Also, the professionals will be required for effective utilization of the system. Reflection I acquired an understanding on the Business Intelligence concepts, as data analysis and processing through these tools and systems. There were challenges on the selection of adequate data gathering process that came up. I would use domain analysis as one of the data collection process if provide a chance to carry out the task again. Portfolio 6 Name of the Artifact Risk Analysis & Management 7
IT Portfolio Description of the Artifact Risk management is a managerial process and strategy for identification, analysis, mitigation, and monitoring of the risks in the projects and the business organizations. Artifact & its Purpose The purpose of the risk management process is to detect, prevent, and control the risks for smooth functioning of the organizational operations and activities. Justification of the Artifact The artifact has been selected as there may be various risks that may hinder the progress of the organizational operations. These may include information security risks, project-related risks, quality risks, ethical risks, and likewise. These need to be prevented and controlled in a timely manner (Besner & Hobbs, 2012). Knowledge Gathered from the Discussion The risk treatment may be done using the strategies as risk avoidance, acceptance, transfer, or mitigation. There are automated tools that the management may use for risk management. Knowledge Required to Implement the System The project details and specifications will be required to implement the risk management process. Reflection I acquired the details on the various risk factors associated with the projects and the strategies that shall be implemented to reduce the risk probability. There were challenges in the information collection and gathering processes that came up (Sanchez, Robert, Bourgault & Pellerin, 2009). I would introduce risk management right from the initiation phase from the next time onwards. 8
IT Portfolio References Abbaszadegan, A., & Grau, D. (2015). Assessing the Influence of Automated Data Analytics onCostandSchedulePerformance.ProcediaEngineering,123,3-6.doi: 10.1016/j.proeng.2015.10.047 Ali, N., Shukur, Z., & Idris, S. (2007). A Design of an Assessment System for UML Class Diagram.2007InternationalConferenceOnComputationalScienceAndIts Applications (ICCSA 2007). doi: 10.1109/iccsa.2007.31 Ashford, W. (2011). Case Study: Data encryption at the Salvation Army. Retrieved from https://www.computerweekly.com/news/2240105270/Case-Study-Data-encryption-at- the-Salvation-Army Besner, C., & Hobbs, B. (2012). The paradox of risk management; a project management practice perspective.International Journal Of Managing Projects In Business,5(2), 230-247. doi: 10.1108/17538371211214923 Boltena, A., & Gomez, J. (2012). A Successful ERP Implementation in an Ethiopian Company: A case Study of ERP Implementation in Mesfine Industrial Engineering Pvt. Ltd.Procedia Technology,5, 40-49. doi: 10.1016/j.protcy.2012.09.005 Gray, P., & El Sawy, O. (2010). Implications for Decision Support Systems.Journal Of Decision Systems,19(4), 377-387. doi: 10.3166/jds.19.377-387 Miri, S., Mansor, N., Chasempour, Z., & Anvari, R. (2014). Staff Organization Training: Designing, Stages, and Methods.Procedia - Social And Behavioral Sciences,129, 227-235. doi: 10.1016/j.sbspro.2014.03.671 Sanchez, H., Robert, B., Bourgault, M., & Pellerin, R. (2009). Risk management applied to projects, programs, and portfolios.International Journal Of Managing Projects In Business,2(1), 14-35. doi: 10.1108/17538370910930491 Toms,E.,&O'Brien,H.(2008).Understandingtheinformationandcommunication technology needs of the eâ€humanist.Journal Of Documentation,64(1), 102-130. doi: 10.1108/00220410810844178 Zheng, J., Feng, Y., & Zhao, Y. (2014). A Unified Modeling Language-Based Design And 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser