Proposal for Knowledge Management System for DPI Crownlands
Verified
Added on  2023/06/10
|21
|4575
|403
AI Summary
This proposal outlines the development of a Knowledge Management System for DPI Crownlands to increase productivity and streamline operations. It includes system architecture, testing and implementation methods, and risk assessment.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Student Details PROJECT PROPOSAL ASSESSMENT 3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents Cover Letter for Sponsor........................................................................................................................2 Executive Summary:..............................................................................................................................3 Introduction (Project Overview):.......................................................................................................4 Review of the Features and functionalities offered by the project:...................................................4 Development of the System (SDLC Phase 4)..........................................................................................5 Architecture:......................................................................................................................................5 Graphical Representation of the Communication flow within the system:...................................6 Integration and Testing (Phase 5 of SDLC).............................................................................................9 Testing Analogy to be followed for the project:..............................................................................10 Unit Testing.....................................................................................................................................10 Integration Testing..........................................................................................................................11 System Testing:................................................................................................................................12 User Acceptance Testing:................................................................................................................13 Implementation (SDLC Phase 6)..........................................................................................................13 Implementation method:................................................................................................................13 Risk Assessment and Mitigation:.........................................................................................................15 Installation of the project................................................................................................................15 Training Delivery:.............................................................................................................................15 User Documentation for the project:..............................................................................................16 Maintenance: (SDLC Phase 7)..............................................................................................................16 Application Support Desk................................................................................................................16 Periodic System Maintenance.........................................................................................................17 System backup and support Environment in case of transitions and changes................................17 Conclusion...........................................................................................................................................17 References...........................................................................................................................................18 1
Cover Letter for Sponsor [ Mr XYZ, Designation Organization ] Subject: Detailed Proposal for Knowledge Management System for DPI Crownlands. Dated: xx/xx/xxxx Respected, Following our conversation earlier today, the detailed proposal for the project follows this letter which would help you learn further about our targets and the approach that we intend to follow for making this project a great success. As discussed with you previously, the KMS solution we intend to develop is focussed on streamlining the operational approach and in turn enhancing the productivity of the business operations at DPI Crownlands. With this project we intend to address the following set of objectives: ï‚·Increased Organizational Productivity. ï‚·Enables the organization to ensure governance, reporting and visibilities for the business maps. ï‚·A centralised location for all the knowledge relevant to the business operations or a centralised repository to the knowledge. ï‚·Automatic reference to the information and data. In order to go ahead with the project I would like to request a financial (value-in kind) assistance approval from the senior management of the organization (You). A detailed proposal for the system architecture and other operational specifications is attached for further reference. Please feel free to contact me in case of any further explanation. Sincerely, [ Closure ] 2
Executive Summary: The organization DPI Crownlands faces certain difficulties following the changing legislation. The report intends to discuss about the development of a Knowledge Management System or KMS as a business mapping software in order to increase the productivity of the organization and the key operations performed by it. The report or the proposal is structured consistent with the flow of SDLC cycle (following step 4, System Development). The report has initially described the system architecture of the purposed software and how the steps like black box testing, unit testing, user acceptance testing will play a crucial role in determining that the developed project is free from every logical as well as technical bug. The report has also highlighted the crucial elements that will be part of the training program which will help the client side to learn the operational as well as the administrative end of the KMS. Towards the end, the proposal describe the change and risk management activities that will be followed during the management of this project. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Introduction (Project Overview): In order to bring a high degree of transparency in the business and the process as well as crucial data available to all the stakeholders such as business partners, customers, staff etc. the Department of Primary industry or DPI Crownlands, intends to use a Knowledge management System. The KMS or the Knowledge management System will allow these stakeholders to learn about how the processes ae being performed within the industry and how more efficiency ca be brought into the same. With the same aim, Assessment 2 purposed the idea of a KMS or Business mapping Software that will provide: Targeted benefits: ï‚·Improved standards of Knowledge management by describing the business process and other standards so as the same can be sued to create corporate knowledge, which will be further shared to carry out different tasks and activities.(Dowling, 2013) ï‚·Enhanced Strategic Visibility: Additionally, the KMS will help the organization in identifying business risks and requirements in order to optimise the efforts.(Al-Ahmad, 2012) Review of the Features and functionalities offered by the project: Features: ï‚·Documenting and Standardizing Business process ï‚·Creating a repository for business knowledge ï‚·Integration of Process Maps to ensure that risks, requirements and inconsistencies can be identified. ï‚·Resource and effort optimisation ï‚·Improved customer satisfaction(Karim et al., 2016) Functional and Non-functional Specifications: ï‚·Information Storage: oMust be able to keep records of the information about customers and other stakeholders. oMust be able to keep track of the business processes and activities that the organization intends to perform. ï‚·Retrieval of information: oThe System must be capable of retrieving the information on the basis of different filters, queries, guidelines and other specific requirements of the operator. ï‚·Collaboration and Mining of knowledge: oThe system must be capable of collaborating with the information collected from different sources, keep track of the information sources, and then effectively mine the required knowledge from the system. ï‚·The Processes and the activities should be controlled and guided by the defined set ofpoliciesandlawsasdefinedbytheorganizationorthegovernment administration. 4
ï‚·The Developed system should be able to automate the storage, management, and analysis of the key information elements stored within the system. ï‚·The GUI of the developed application should be easy to use an interactive. ï‚·The Developed system must provide a support section to help the new users learn about the basic operating approach of the system. (DesignofPatientMonitoringSystem(PMS)ApplicationusingSecurityDesignPatternsin Architecture Phase of Secure SDLC, 2016) Development of the System (SDLC Phase 4) As highlighted in Assessment 2, the project will be developed on the basis of the Agile Development methodology to ensure continuous improvement for the project on the basis of the inputs and feedbacks received. Architecture: The following Architecture for the System was highlighted in the previous Assessment. Representation of the different modules: Inputs Resources In order to develop this Architecture the project team will need inputs from different stakeholders associated with the project. 5
As highlighted in the above figure the inputs for stakeholders, pre-existing data records, evaluation techniques, operating environment of the organization and the knowledge forms (policies and regulations) will be the key contributors required to develop the architecture of the Knowledge management system. Graphical Representation of the Communication flow within the system: User Control Flow: 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The given figure defines how the control will flow throughout the application and the way through which the admin and the regular users can interact with the application or the system. Each user will be assigned a different permission set on the basis of their roles within the application.(Karim et al., 2016) The following figure defines different layers of the application or the system: (Bansal & Kumar, 2014) For example, as in case of the admin, the person will have the permissions to control, the cache, configure data base and filters, configure database properties, etc. Similarly, a regular user can only interact with the system with help of messages with the Theme or UI of the System acting as the sole intermediate.(Rozenes, 2011) Graphical Representation for some of the Use Cases for the Purposed System: Following are some of the example Use cases and the Control flow for the system: 1.Top layer use case Top layer use case defining the permissions every actor or user will have corresponding to their roles in the system. 7
(Bansal & Kumar, 2014) 2.User Authentication use case: (Bansal & Kumar, 2014) 3.Knowledge Access Use case 8
(Bansal & Kumar, 2014) Programming languages and technologies used: In order to develop the Web based Knowledge Management System, following programming languages will be used: Front end: HTML, CSS, XML. (User Interface layer) Backend: PHP, Java Script Database Management SQL Integration and Testing (Phase 5 of SDLC) The integration and testing phase of Software or System Development lifecycle deals with two key processes or operations that include: ï‚·Testing of the developed modules ï‚·Integration of the Developed Unit Modules The Development Phase of the System Development Life cycle delivers working modules for each specific requirement of the project. Once the modules are developed, they are then tested for functionalities and technical reliability(Jindal, 2016). Further on, once the developed modules are deemed free of any possible logical as well as technical error they are then integrated into a single consolidated module or the complete solution, or System. After, integration, the system is then 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
again tested for inter-modular and intra modular communication and compatibilities to ensure that the developed system or software is reliable to address the key requirements of the user group. (K.Pandey & Batra, 2013) Testing Analogy to be followed for the project: Unit Testing Cycle for the Modules: 10 Unit TestingIntegration Testing System Testing Acceptance Testing
As evident in the above cycle the focus of the unit testing approach is to fix the functionalities of each of the module. The Unit tests are executed on each modules in order to identify the bugs and errors that are present in the module. Further on the basis of the reviews received from the testing approach, the codes are then reviewed and the necessary changes are being made.(K.Pandey & Batra, 2013) Selected Unit Testing Approach for the project: For this particular project the Unit Testing will be done on the basis of the following mentioned techniques: ï‚·Functional Testing: Under this black box testing technique the functionality of the developed module will be tested. For example oBoundary value analysis or testing will be conducted to obtain the point of failure for the project. oInput domain testing can be used to obtain the constraints related to the inputs given to the KMS where the system might exhibit n unusual behaviour.(Pradhan, 2014) Following the functional testing, the second phase of unit testing will include a rigorous structural testing approach to be used for: ï‚·Statement testing to ensure that each code instruction of the project or system is tested at least once for syntax as well as its functionality. ï‚·Path Testing where each possible conditional path of the project source will be tested for integrity. In order to perform any type of testing the foremost requirement is to develop the test cases that will be used to test the behaviour and the functionalities of the code written for each module. Some of the Test Cases for the Unit testing will include: ï‚·User Authentication oCorrect password and user name oEmpty User Name and password oEmpty user name but correct password oIncorrect password. Etc. ï‚·Knowledge discover query: oAdding a new user group oAdding a new information element oUpdating the information elements oModifying the information oDeleting the information etc. SimilarlyothermodulesoftheSystemwillbetestedagainstdifferentconditionsetand circumstances. 11
Integration Testing Following the Successful implementation of the unit testing the next step in this phase will be to undergo Integration testing: The key purpose of the Integration testing is to ensure that there are no defects or problems in the interfaces of the different modules, i.e. all the distinct modules of the application are effectively integrated with each other and have a reliable inter module communication.(Sharma and Singh, 2015) For example: One module is able to send data packets to another modules. Selected Approach for Integration Testing Top Down incremental testing: Under this approach the logically related modules are integrated and then tested for continuity and communication using the top down approach, I.e. the module with high priority or level is tested along the flow of the system or the software.(Wang et al., n.d.) Testing Flow Sample Test cases for Integration Testing: ï‚·Checking the link between the Login module and the user profile module oChecking the link between the user profile module and the update profile information module ï‚·Checking the link between the login module and the user permission module oChecking whether the user can navigate to knowledge query module oWhether the user can input a query for knowledge retrieval.(Laskowski, 2011) After Integration testing is completed and the required anomalies are being addressed the next step in the Testing phase will be to implement System Testing and User Acceptance testing. System Testing: The purpose of System testing is to ensure that the whole system is working fine as a collective unit. The System testing is carried out by the in-house development team and the testing team. For this project the testing team will use different black box testing approaches such as boundary value 12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
analysis and input domain testing to ensure that the collective system is able to address the key requirements of the project.(K.Pandey and Batra, 2013) For example: Under this approach, the testing team will create a user account, update the profile information and then carry out all the permitted tasks to see whether there exist any bug or functional. Loop-hole in the developed system. User Acceptance Testing: For the purpose the purposed approach include: ï‚·Launching Beta version of the application or the system in client side i.e. Within the DPI Crownlands organization.(K.Pandey and Batra, 2013) The target for this approach will be: ï‚·The users will be able to use the application or the system in the real time and will be able to give input relevant to: oThe Graphical User interface of the application. oThe Functionalities that are already present in the application or the system. oThe required set of functionalities within the System. oThe reliability of the application in the real world use. The beta version will be given to the client side for a period of 45 days. Following the completion of the Beta testing period the identified bugs, loopholes or glitches can be fixed in order to deliver a fully dedicated system. During the User Acceptance testing process the key addressable objectives will include: ï‚·The Developed system should address all the required functionalities of the user. ï‚·The developed system should be highly user friendly. ï‚·The developed system is free from any logical or technical loophole. ï‚·All the business requirements of the client side are met. ï‚·The developed system is reliable and has the strength to ensure increased productivity for the organizer.(Holtsnider, 2010) Implementation (SDLC Phase 6) The core focus of the implementation phase is to implement the purposed system at the client side or in other words, in this stage the finalized software system is then installed at the client site. The key addressable areas for this phase include: ï‚·Finalization of the Implementation method ï‚·Delivering training and assistance to the intended user set. ï‚·Provide user documentation for the project. Implementation method: As detailed previously the whole project will follow the Agile project management methodology where continuous feedbacks and inputs from the user groups will be used to improve the functionality of the system being developed.(Beyer, 2010)Further the Timeline and the Milestones provided in the Assessment 2 will also be used to control the implementation process of the whole project at the client site. The timeline of the project needs to be consistent. Agile Model of project development: 13
Consistent with Assessment 2 Change Management Flow: Changes are an evident part of any project. The following flow describes the process how the changes will be addressed and acknowledged throughout the scope of this project. (Faisal, 2013) 14
Risk Assessment and Mitigation: Identified RiskPotential causePossible Result Mitigation Approach Concerned Professionals Inappropriate project scope Lackofeffective requirement Analysisand Elicitation Development ofan incomplete solution TheIterative approach of Agile development practice will allow the project team torevisitthe requirements periodicallyand evaluated whetherallthe requirements havebe effectively identifiedand addressed. Business Analyst Project Clients Potential failure to addressthe timeline Lackofeffective schedule planning andrequirement identification Inabilityto complete the projecton time Regularreview meetingsand sessions to check whetherthe projectisbeing executedasper thedesired timeline. Project leader Over CostIneffectivecost andbudget analysis Inflation Financial loseRegularreview meetingsand sessions Project Leader Business Analyst (G. Kamau, 2015.) Installation of the project As the target project follows a web-based nature i.e. the whole system will be controlled and operated with the help of an online portal system whose access will be handed over to the client side.(Eliot, 2016) Training Delivery: After successful installation of the project at the client site the next important step will be to provide training assistance to the workforce of the client side. In other words, the development team will required to train the CPI Crownlands employees, executives and managers in accordance with their roles for the system or the project.(Faisal, 2013) The training program will be divided into 2 major parts: ï‚·Admin Training ï‚·Executive Training Admin Training Program: 15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Under this program the senior management or the concerned person of the organization will be trained to operate as the admin for the whole system.(Pandit, and Dr. S. M. Yadav,2012) The admin will be able to conduct the following set of operations: ï‚·Manage, update or modify the backend of the application system. ï‚·Modify or control the user permission set. ï‚·Increase or decrease the permission set for the concerned user groups. ï‚·Manage, update or modify the knowledge database. ï‚·Take database backups. ï‚·Delete entries from the database. During the training program the System administrator will be trained to handle the technical flows and control structure of the system.(Pulina, & Santoni, 2018) Similarly in the Executive training Program, the concerned individuals will be trained for the following set of operation: ï‚·Passing Messages in the Software system. ï‚·Input Knowledge related query. ï‚·Get results relevant to their roles and authorities. The training provided to both the groups will be based upon their respective roles within the system. Key elements of the training will include: ï‚·Clearly defined training goals and objectives. oThe training goals and objectives will be constructed as per the individual needs of the different user groups. ï‚·Structured Training delivery methods oClassroom style Hands-on instructor-led training oGroup Demonstration in seminar formats oIndividual trainings with the instructors oComputer Based Training (CBT) (Pulina, & Santoni, 2018) oUser guides and documentation based training. User Documentation for the project: The user documentation will focus on delivery a step by step guide with graphical and video-graphic assistance to ensure that the users are able to effectively understand the control structure of the system and can then learn to use the system with ease. Maintenance: (SDLC Phase 7) The core focus of this SDLC phase is to provide after delivery assistance for the project. During this phase of the SDLC the project team will focus on delivering the following mentioned services to the client side: Application Support Desk The purpose of the Application support desk will be to ensure that the user get a 24*7 support from the development team regarding the usability and the functionality of the system being developed. The application will be provided with a chat box where the user can directly reach out to the support 16
team in case of any malfunction or anomaly that is faced during any process or activity that the user conducted on the system or the application. Periodic System Maintenance Under this service the development team will provide a periodic assistance to the DPI Crownland organization. The purpose of this assistance will be to ensure that the application is working appropriately and can be relied upon. Under this service, the development team will conduct a quarterly check for the application backend and User Interface to test its functioning. System backup and support Environment in case of transitions and changes. The System backup service will ensure that the database of the application or the system is backed up periodically (every midnight on a backup server) to ensure that in case of a failure the system can be restored with minimal damage or issues. This service will be paid following the first year of the application. The service cost will include an annual charge of $5000 from the DPI crownlands organization. For the first year, the service the development team will offer the same service for zero cost. Conclusion Following a detailed analysis of the project proposal, the potential benefits the project intends to provide and the SDLC process it is clear the proposed project is indeed crucial to improve the performance and productivity of the organization and its operation. Further it is also important for the organization as well as the development team to practically implement the objectives and the goals structured in the theoretical proposal in order to yield maximum benefits. 17
References Al-Ahmad, W. (2012). Knowledge of IT Project Success and Failure Factors.International Journal of Information Technology Project Management, 3(4), pp.56-71. Bansal, J., & Kumar, V. 2014. Knowledge Management as Strategic Tool for Group of Institutions: A Modular Approach to Library Knowledge Management System.Journal of Knowledge & Communication Management, 4(1): 82. Beyer, H. (2010).User-centered agile methods. [San Rafael, Calif.]: Morgan & Claypool Publishers. Design of Patient Monitoring System(PMS) Application using Security Design Patterns in Architecture Phase of Secure SDLC. (2016).International Journal of Modern Trends in Engineering & Research, 3(12), pp.29-34. Dowling, P. (2013). Successfully transitioning a research project to a commercial spin-out using an agile software process.Journal of Software: Evolution and Process, 26(5), pp.468- 475. Eliot, G. (2016).The mill on the Floss. New York: Open Road Integrated Media. Faisal, A. (2013). Value-Driven Approach for Project Success and Change Management in Malaysian Institutions of Higher Learning (IHL).International Journal of Informatics and Communication Technology (IJ-ICT), 2(2). G. Kamau, C. 2015. Efficacy of Monitoring and Evaluation Function in Achieving Project Success in Kenya: A Conceptual Framework.Science Journal of Business and Management, 3(3): 82. Holtsnider,B.(2010).Agiledevelopment&businessgoals.Burlington,MA:Morgan Kaufmann Publishers. Jindal, T. 2016. Importance of Testing in SDLC.International Journal of Engineering and Applied Computer Science, 01(02): 54-56. K.Pandey,S.,&Batra,M.2013.SecurityTestinginRequirementsPhaseofSDLC. International Journal of Computer Applications, 68(9): 31-35. K.Pandey,S.,&Batra,M.2013.FormalMethodsinRequirementsPhaseofSDLC. International Journal of Computer Applications, 70(13): 7-14. Karim, N., Albuolayan, A., Saba, T. and Rehman, A. (2016). The practice of secure software development in SDLC: an investigation through existing model and a case study.Security and Communication Networks, 9(18), pp.5333-5345. Laskowski, J. (2011).Agile IT security implementation methodology. Birmingham: Packt Pub. Pandit, D. and Dr. S. M. Yadav, D. (2012). Effective Project Controls at Project Development Stage.International Journal of Scientific Research, 2(7), pp.137-139. 18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Pradhan, S. 2014. Total Quality Management in Service Sector: Case Study of Academic Libraries.Journal of Business and Management Sciences, 2(3A): 29-32. Pulina, M., & Santoni, V. 2018. A two-stage DEA approach to analyse the efficiency of the hospitality sector.Tourism Economics, 24(3): 352-365. Rozenes,S.(2011).TheImpactofProjectManagementMethodologiesonProject Performance.International Journal of Information Technology Project Management, 2(2), pp.64-73. Sharma, P. and Singh, D. (2015). Comparative Study of Various SDLC Models on Different Parameters.International Journal of Engineering Research, 4(4), pp.188-191. Wang,X.,Ali,N.,Ramos,I.andVidgen,R.(n.d.).Agileandleanservice-oriented development. 19