Proposal for Knowledge Management System for DPI Crownlands

Verified

Added on  2023/06/10

|21
|4575
|403
AI Summary
This proposal outlines the development of a Knowledge Management System for DPI Crownlands to increase productivity and streamline operations. It includes system architecture, testing and implementation methods, and risk assessment.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Student Details
PROJECT PROPOSAL
ASSESSMENT 3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Cover Letter for Sponsor........................................................................................................................2
Executive Summary:..............................................................................................................................3
Introduction (Project Overview):.......................................................................................................4
Review of the Features and functionalities offered by the project:...................................................4
Development of the System (SDLC Phase 4)..........................................................................................5
Architecture:......................................................................................................................................5
Graphical Representation of the Communication flow within the system:...................................6
Integration and Testing (Phase 5 of SDLC).............................................................................................9
Testing Analogy to be followed for the project:..............................................................................10
Unit Testing.....................................................................................................................................10
Integration Testing..........................................................................................................................11
System Testing:................................................................................................................................12
User Acceptance Testing:................................................................................................................13
Implementation (SDLC Phase 6)..........................................................................................................13
Implementation method:................................................................................................................13
Risk Assessment and Mitigation:.........................................................................................................15
Installation of the project................................................................................................................15
Training Delivery:.............................................................................................................................15
User Documentation for the project:..............................................................................................16
Maintenance: (SDLC Phase 7)..............................................................................................................16
Application Support Desk................................................................................................................16
Periodic System Maintenance.........................................................................................................17
System backup and support Environment in case of transitions and changes................................17
Conclusion...........................................................................................................................................17
References...........................................................................................................................................18
1
Document Page
Cover Letter for Sponsor
[
Mr XYZ,
Designation
Organization
]
Subject: Detailed Proposal for Knowledge Management System for DPI Crownlands.
Dated: xx/xx/xxxx
Respected,
Following our conversation earlier today, the detailed proposal for the project follows this
letter which would help you learn further about our targets and the approach that we intend to
follow for making this project a great success.
As discussed with you previously, the KMS solution we intend to develop is focussed on
streamlining the operational approach and in turn enhancing the productivity of the business
operations at DPI Crownlands. With this project we intend to address the following set of objectives:
ï‚· Increased Organizational Productivity.
ï‚· Enables the organization to ensure governance, reporting and visibilities for the business
maps.
ï‚· A centralised location for all the knowledge relevant to the business operations or a
centralised repository to the knowledge.
ï‚· Automatic reference to the information and data.
In order to go ahead with the project I would like to request a financial (value-in kind) assistance
approval from the senior management of the organization (You). A detailed proposal for the system
architecture and other operational specifications is attached for further reference.
Please feel free to contact me in case of any further explanation.
Sincerely,
[
Closure
]
2
Document Page
Executive Summary:
The organization DPI Crownlands faces certain difficulties following the changing legislation.
The report intends to discuss about the development of a Knowledge Management System
or KMS as a business mapping software in order to increase the productivity of the
organization and the key operations performed by it.
The report or the proposal is structured consistent with the flow of SDLC cycle (following
step 4, System Development). The report has initially described the system architecture of
the purposed software and how the steps like black box testing, unit testing, user
acceptance testing will play a crucial role in determining that the developed project is free
from every logical as well as technical bug.
The report has also highlighted the crucial elements that will be part of the training program
which will help the client side to learn the operational as well as the administrative end of
the KMS. Towards the end, the proposal describe the change and risk management activities
that will be followed during the management of this project.
3

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction (Project Overview):
In order to bring a high degree of transparency in the business and the process as well as
crucial data available to all the stakeholders such as business partners, customers, staff etc.
the Department of Primary industry or DPI Crownlands, intends to use a Knowledge
management System. The KMS or the Knowledge management System will allow these
stakeholders to learn about how the processes ae being performed within the industry and
how more efficiency ca be brought into the same.
With the same aim, Assessment 2 purposed the idea of a KMS or Business mapping
Software that will provide:
Targeted benefits:
ï‚· Improved standards of Knowledge management by describing the business process and other
standards so as the same can be sued to create corporate knowledge, which will be further shared to
carry out different tasks and activities. (Dowling, 2013)
ï‚· Enhanced Strategic Visibility: Additionally, the KMS will help the organization in identifying
business risks and requirements in order to optimise the efforts. (Al-Ahmad, 2012)
Review of the Features and functionalities offered by the project:
Features:
ï‚· Documenting and Standardizing Business process
ï‚· Creating a repository for business knowledge
ï‚· Integration of Process Maps to ensure that risks, requirements and inconsistencies
can be identified.
ï‚· Resource and effort optimisation
ï‚· Improved customer satisfaction (Karim et al., 2016)
Functional and Non-functional Specifications:
ï‚· Information Storage:
o Must be able to keep records of the information about customers and other
stakeholders.
o Must be able to keep track of the business processes and activities that the
organization intends to perform.
ï‚· Retrieval of information:
o The System must be capable of retrieving the information on the basis of
different filters, queries, guidelines and other specific requirements of the
operator.
ï‚· Collaboration and Mining of knowledge:
o The system must be capable of collaborating with the information collected
from different sources, keep track of the information sources, and then
effectively mine the required knowledge from the system.
ï‚· The Processes and the activities should be controlled and guided by the defined set
of policies and laws as defined by the organization or the government
administration.
4
Document Page
ï‚· The Developed system should be able to automate the storage, management, and
analysis of the key information elements stored within the system.
ï‚· The GUI of the developed application should be easy to use an interactive.
ï‚· The Developed system must provide a support section to help the new users learn
about the basic operating approach of the system.
(Design of Patient Monitoring System(PMS) Application using Security Design Patterns in
Architecture Phase of Secure SDLC, 2016)
Development of the System (SDLC Phase 4)
As highlighted in Assessment 2, the project will be developed on the basis of the Agile
Development methodology to ensure continuous improvement for the project on the basis
of the inputs and feedbacks received.
Architecture:
The following Architecture for the System was highlighted in the previous Assessment.
Representation of the different modules:
Inputs Resources
In order to develop this Architecture the project team will need inputs from different
stakeholders associated with the project.
5
Document Page
As highlighted in the above figure the inputs for stakeholders, pre-existing data records,
evaluation techniques, operating environment of the organization and the knowledge forms
(policies and regulations) will be the key contributors required to develop the architecture
of the Knowledge management system.
Graphical Representation of the Communication flow within the system:
User Control Flow:
6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The given figure defines how the control will flow throughout the application and the way
through which the admin and the regular users can interact with the application or the
system. Each user will be assigned a different permission set on the basis of their roles
within the application. (Karim et al., 2016)
The following figure defines different layers of the application or the system:
(Bansal & Kumar, 2014)
For example, as in case of the admin, the person will have the permissions to control, the
cache, configure data base and filters, configure database properties, etc. Similarly, a regular
user can only interact with the system with help of messages with the Theme or UI of the
System acting as the sole intermediate. (Rozenes, 2011)
Graphical Representation for some of the Use Cases for the Purposed System:
Following are some of the example Use cases and the Control flow for the system:
1. Top layer use case
Top layer use case defining the permissions every actor or user will have corresponding to
their roles in the system.
7
Document Page
(Bansal & Kumar, 2014)
2. User Authentication use case:
(Bansal & Kumar, 2014)
3. Knowledge Access Use case
8
Document Page
(Bansal & Kumar, 2014)
Programming languages and technologies used:
In order to develop the Web based Knowledge Management System, following programming
languages will be used:
Front end:
HTML, CSS, XML. (User Interface layer)
Backend:
PHP, Java Script
Database Management
SQL
Integration and Testing (Phase 5 of SDLC)
The integration and testing phase of Software or System Development lifecycle deals with two key
processes or operations that include:
ï‚· Testing of the developed modules
ï‚· Integration of the Developed Unit Modules
The Development Phase of the System Development Life cycle delivers working modules for each
specific requirement of the project. Once the modules are developed, they are then tested for
functionalities and technical reliability (Jindal, 2016). Further on, once the developed modules are
deemed free of any possible logical as well as technical error they are then integrated into a single
consolidated module or the complete solution, or System. After, integration, the system is then
9

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
again tested for inter-modular and intra modular communication and compatibilities to ensure that
the developed system or software is reliable to address the key requirements of the user group.
(K.Pandey & Batra, 2013)
Testing Analogy to be followed for the project:
Unit Testing
Cycle for the Modules:
10
Unit Testing Integration
Testing
System
Testing
Acceptance
Testing
Document Page
As evident in the above cycle the focus of the unit testing approach is to fix the functionalities of
each of the module. The Unit tests are executed on each modules in order to identify the bugs and
errors that are present in the module. Further on the basis of the reviews received from the testing
approach, the codes are then reviewed and the necessary changes are being made. (K.Pandey & Batra,
2013)
Selected Unit Testing Approach for the project:
For this particular project the Unit Testing will be done on the basis of the following mentioned
techniques:
ï‚· Functional Testing:
Under this black box testing technique the functionality of the developed module will be tested. For
example
o Boundary value analysis or testing will be conducted to obtain the point of failure for
the project.
o Input domain testing can be used to obtain the constraints related to the inputs
given to the KMS where the system might exhibit n unusual behaviour. (Pradhan,
2014)
Following the functional testing, the second phase of unit testing will include a rigorous structural
testing approach to be used for:
ï‚· Statement testing to ensure that each code instruction of the project or system is tested
at least once for syntax as well as its functionality.
ï‚· Path Testing where each possible conditional path of the project source will be tested
for integrity.
In order to perform any type of testing the foremost requirement is to develop the test cases that
will be used to test the behaviour and the functionalities of the code written for each module.
Some of the Test Cases for the Unit testing will include:
ï‚· User Authentication
o Correct password and user name
o Empty User Name and password
o Empty user name but correct password
o Incorrect password.
Etc.
ï‚· Knowledge discover query:
o Adding a new user group
o Adding a new information element
o Updating the information elements
o Modifying the information
o Deleting the information etc.
Similarly other modules of the System will be tested against different condition set and
circumstances.
11
Document Page
Integration Testing
Following the Successful implementation of the unit testing the next step in this phase will be to
undergo Integration testing:
The key purpose of the Integration testing is to ensure that there are no defects or problems in the
interfaces of the different modules, i.e. all the distinct modules of the application are effectively
integrated with each other and have a reliable inter module communication. (Sharma and Singh, 2015)
For example: One module is able to send data packets to another modules.
Selected Approach for Integration Testing
Top Down incremental testing:
Under this approach the logically related modules are integrated and then tested for continuity and
communication using the top down approach, I.e. the module with high priority or level is tested
along the flow of the system or the software. (Wang et al., n.d.)
Testing Flow
Sample Test cases for Integration Testing:
ï‚· Checking the link between the Login module and the user profile module
o Checking the link between the user profile module and the update profile
information module
ï‚· Checking the link between the login module and the user permission module
o Checking whether the user can navigate to knowledge query module
o Whether the user can input a query for knowledge retrieval. (Laskowski, 2011)
After Integration testing is completed and the required anomalies are being addressed the next step
in the Testing phase will be to implement System Testing and User Acceptance testing.
System Testing:
The purpose of System testing is to ensure that the whole system is working fine as a collective unit.
The System testing is carried out by the in-house development team and the testing team. For this
project the testing team will use different black box testing approaches such as boundary value
12

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
analysis and input domain testing to ensure that the collective system is able to address the key
requirements of the project. (K.Pandey and Batra, 2013)
For example: Under this approach, the testing team will create a user account, update the profile
information and then carry out all the permitted tasks to see whether there exist any bug or
functional. Loop-hole in the developed system.
User Acceptance Testing:
For the purpose the purposed approach include:
ï‚· Launching Beta version of the application or the system in client side i.e. Within the DPI
Crownlands organization. (K.Pandey and Batra, 2013)
The target for this approach will be:
ï‚· The users will be able to use the application or the system in the real time and will be
able to give input relevant to:
o The Graphical User interface of the application.
o The Functionalities that are already present in the application or the system.
o The required set of functionalities within the System.
o The reliability of the application in the real world use.
The beta version will be given to the client side for a period of 45 days. Following the completion of
the Beta testing period the identified bugs, loopholes or glitches can be fixed in order to deliver a
fully dedicated system.
During the User Acceptance testing process the key addressable objectives will include:
ï‚· The Developed system should address all the required functionalities of the user.
ï‚· The developed system should be highly user friendly.
ï‚· The developed system is free from any logical or technical loophole.
ï‚· All the business requirements of the client side are met.
ï‚· The developed system is reliable and has the strength to ensure increased productivity
for the organizer. (Holtsnider, 2010)
Implementation (SDLC Phase 6)
The core focus of the implementation phase is to implement the purposed system at the client side
or in other words, in this stage the finalized software system is then installed at the client site. The
key addressable areas for this phase include:
ï‚· Finalization of the Implementation method
ï‚· Delivering training and assistance to the intended user set.
ï‚· Provide user documentation for the project.
Implementation method:
As detailed previously the whole project will follow the Agile project management methodology
where continuous feedbacks and inputs from the user groups will be used to improve the
functionality of the system being developed. (Beyer, 2010) Further the Timeline and the Milestones
provided in the Assessment 2 will also be used to control the implementation process of the whole
project at the client site. The timeline of the project needs to be consistent.
Agile Model of project development:
13
Document Page
Consistent with Assessment 2
Change Management Flow:
Changes are an evident part of any project. The following flow describes the process how the
changes will be addressed and acknowledged throughout the scope of this project.
(Faisal, 2013)
14
Document Page
Risk Assessment and Mitigation:
Identified Risk Potential cause Possible
Result
Mitigation
Approach
Concerned
Professionals
Inappropriate
project scope
Lack of effective
requirement
Analysis and
Elicitation
Development
of an
incomplete
solution
The Iterative
approach of Agile
development
practice will allow
the project team
to revisit the
requirements
periodically and
evaluated
whether all the
requirements
have be
effectively
identified and
addressed.
Business Analyst
Project Clients
Potential failure to
address the
timeline
Lack of effective
schedule planning
and requirement
identification
Inability to
complete the
project on
time
Regular review
meetings and
sessions to check
whether the
project is being
executed as per
the desired
timeline.
Project leader
Over Cost Ineffective cost
and budget
analysis
Inflation
Financial lose Regular review
meetings and
sessions
Project Leader
Business Analyst
(G. Kamau, 2015.)
Installation of the project
As the target project follows a web-based nature i.e. the whole system will be controlled and
operated with the help of an online portal system whose access will be handed over to the client
side. (Eliot, 2016)
Training Delivery:
After successful installation of the project at the client site the next important step will be to provide
training assistance to the workforce of the client side. In other words, the development team will
required to train the CPI Crownlands employees, executives and managers in accordance with their
roles for the system or the project. (Faisal, 2013)
The training program will be divided into 2 major parts:
ï‚· Admin Training
ï‚· Executive Training
Admin Training Program:
15

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Under this program the senior management or the concerned person of the organization will be
trained to operate as the admin for the whole system. (Pandit, and Dr. S. M. Yadav, 2012)
The admin will be able to conduct the following set of operations:
ï‚· Manage, update or modify the backend of the application system.
ï‚· Modify or control the user permission set.
ï‚· Increase or decrease the permission set for the concerned user groups.
ï‚· Manage, update or modify the knowledge database.
ï‚· Take database backups.
ï‚· Delete entries from the database.
During the training program the System administrator will be trained to handle the technical flows
and control structure of the system. (Pulina, & Santoni, 2018)
Similarly in the Executive training Program, the concerned individuals will be trained for the
following set of operation:
ï‚· Passing Messages in the Software system.
ï‚· Input Knowledge related query.
ï‚· Get results relevant to their roles and authorities.
The training provided to both the groups will be based upon their respective roles within the system.
Key elements of the training will include:
ï‚· Clearly defined training goals and objectives.
o The training goals and objectives will be constructed as per the individual needs of
the different user groups.
ï‚· Structured Training delivery methods
o Classroom style Hands-on instructor-led training
o Group Demonstration in seminar formats
o Individual trainings with the instructors
o Computer Based Training (CBT) (Pulina, & Santoni, 2018)
o User guides and documentation based training.
User Documentation for the project:
The user documentation will focus on delivery a step by step guide with graphical and video-graphic
assistance to ensure that the users are able to effectively understand the control structure of the
system and can then learn to use the system with ease.
Maintenance: (SDLC Phase 7)
The core focus of this SDLC phase is to provide after delivery assistance for the project. During this
phase of the SDLC the project team will focus on delivering the following mentioned services to the
client side:
Application Support Desk
The purpose of the Application support desk will be to ensure that the user get a 24*7 support from
the development team regarding the usability and the functionality of the system being developed.
The application will be provided with a chat box where the user can directly reach out to the support
16
Document Page
team in case of any malfunction or anomaly that is faced during any process or activity that the user
conducted on the system or the application.
Periodic System Maintenance
Under this service the development team will provide a periodic assistance to the DPI Crownland
organization. The purpose of this assistance will be to ensure that the application is working
appropriately and can be relied upon. Under this service, the development team will conduct a
quarterly check for the application backend and User Interface to test its functioning.
System backup and support Environment in case of transitions and changes.
The System backup service will ensure that the database of the application or the system is backed
up periodically (every midnight on a backup server) to ensure that in case of a failure the system can
be restored with minimal damage or issues.
This service will be paid following the first year of the application. The service cost will include an
annual charge of $5000 from the DPI crownlands organization. For the first year, the service the
development team will offer the same service for zero cost.
Conclusion
Following a detailed analysis of the project proposal, the potential benefits the project intends to
provide and the SDLC process it is clear the proposed project is indeed crucial to improve the
performance and productivity of the organization and its operation. Further it is also important for
the organization as well as the development team to practically implement the objectives and the
goals structured in the theoretical proposal in order to yield maximum benefits.
17
Document Page
References
Al-Ahmad, W. (2012). Knowledge of IT Project Success and Failure Factors. International
Journal of Information Technology Project Management, 3(4), pp.56-71.
Bansal, J., & Kumar, V. 2014. Knowledge Management as Strategic Tool for Group of
Institutions: A Modular Approach to Library Knowledge Management System. Journal of
Knowledge & Communication Management, 4(1): 82.
Beyer, H. (2010). User-centered agile methods. [San Rafael, Calif.]: Morgan & Claypool
Publishers.
Design of Patient Monitoring System(PMS) Application using Security Design Patterns in
Architecture Phase of Secure SDLC. (2016). International Journal of Modern Trends in
Engineering & Research, 3(12), pp.29-34.
Dowling, P. (2013). Successfully transitioning a research project to a commercial spin-out
using an agile software process. Journal of Software: Evolution and Process, 26(5), pp.468-
475.
Eliot, G. (2016). The mill on the Floss. New York: Open Road Integrated Media.
Faisal, A. (2013). Value-Driven Approach for Project Success and Change Management in
Malaysian Institutions of Higher Learning (IHL). International Journal of Informatics and
Communication Technology (IJ-ICT), 2(2).
G. Kamau, C. 2015. Efficacy of Monitoring and Evaluation Function in Achieving Project
Success in Kenya: A Conceptual Framework. Science Journal of Business and Management,
3(3): 82.
Holtsnider, B. (2010). Agile development & business goals. Burlington, MA: Morgan
Kaufmann Publishers.
Jindal, T. 2016. Importance of Testing in SDLC. International Journal of Engineering and
Applied Computer Science, 01(02): 54-56.
K.Pandey, S., & Batra, M. 2013. Security Testing in Requirements Phase of SDLC.
International Journal of Computer Applications, 68(9): 31-35.
K.Pandey, S., & Batra, M. 2013. Formal Methods in Requirements Phase of SDLC.
International Journal of Computer Applications, 70(13): 7-14.
Karim, N., Albuolayan, A., Saba, T. and Rehman, A. (2016). The practice of secure software
development in SDLC: an investigation through existing model and a case study. Security
and Communication Networks, 9(18), pp.5333-5345.
Laskowski, J. (2011). Agile IT security implementation methodology. Birmingham: Packt Pub.
Pandit, D. and Dr. S. M. Yadav, D. (2012). Effective Project Controls at Project Development
Stage. International Journal of Scientific Research, 2(7), pp.137-139.
18

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Pradhan, S. 2014. Total Quality Management in Service Sector: Case Study of Academic
Libraries. Journal of Business and Management Sciences, 2(3A): 29-32.
Pulina, M., & Santoni, V. 2018. A two-stage DEA approach to analyse the efficiency of the
hospitality sector. Tourism Economics, 24(3): 352-365.
Rozenes, S. (2011). The Impact of Project Management Methodologies on Project
Performance. International Journal of Information Technology Project Management, 2(2),
pp.64-73.
Sharma, P. and Singh, D. (2015). Comparative Study of Various SDLC Models on Different
Parameters. International Journal of Engineering Research, 4(4), pp.188-191.
Wang, X., Ali, N., Ramos, I. and Vidgen, R. (n.d.). Agile and lean service-oriented
development.
19
Document Page
20
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]