Software Implementation Challenges and Solutions
VerifiedAdded on 2020/03/23
|46
|9649
|63
AI Summary
The provided assignment delves into the complexities of software implementation, outlining five key challenges that frequently arise during this process. It then presents practical solutions and best practices to mitigate these issues, ultimately aiming to guide readers towards successful software implementation projects. The document incorporates relevant research papers and industry insights to support its analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
SITP – Case Proposal Report 1
PRELIMINARY PLANNING DOCUMENTPRELIMINARY PLANNING DOCUMENT
Prepared for Coin Free Project
Issued by SITP Inc.
PRELIMINARY PLANNING DOCUMENTPRELIMINARY PLANNING DOCUMENT
Prepared for Coin Free Project
Issued by SITP Inc.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 2
Authors: Tianyuan Zheng (12196681), MinqiZhong (12158869), SoumyaRisal (12106365),
Muhammad SohaibWaheed (12434977), Moussa Saleh (12009472)
Authors: Tianyuan Zheng (12196681), MinqiZhong (12158869), SoumyaRisal (12106365),
Muhammad SohaibWaheed (12434977), Moussa Saleh (12009472)
SITP – Case Proposal Report 3
TABLE OF CONTENTS
1 Management Summary............................................................................................................7
2 Background..............................................................................................................................8
3 Scope and Assumption.............................................................................................................9
3.1 Scope..................................................................................................................................9
3.1.1 In Scope......................................................................................................................9
3.1.2 Out of Scope...............................................................................................................9
3.2 Assumptions......................................................................................................................9
4 Objectives...............................................................................................................................10
5 Final Solution Overview........................................................................................................11
5.1 Solution introduction.......................................................................................................11
5.2 Solution high-level description........................................................................................12
5.3 Business brief...................................................................................................................14
6 Stakeholders...........................................................................................................................16
6.1 Stakeholder management matrix (Preliminary)...............................................................17
6.2 Stakeholder communication matrix (Preliminary)..........................................................19
7 Solution Technologies...........................................................................................................22
8 Software..................................................................................................................................22
9 Data management and Database..........................................................................................22
9.1 Data management/Data Integrity.....................................................................................24
9.2 Backup Strategy...............................................................................................................26
9.3 DBMS..............................................................................................................................29
9.4 Database Management.....................................................................................................30
10 Business Issues......................................................................................................................32
10.1 Organizational Impacts................................................................................................32
TABLE OF CONTENTS
1 Management Summary............................................................................................................7
2 Background..............................................................................................................................8
3 Scope and Assumption.............................................................................................................9
3.1 Scope..................................................................................................................................9
3.1.1 In Scope......................................................................................................................9
3.1.2 Out of Scope...............................................................................................................9
3.2 Assumptions......................................................................................................................9
4 Objectives...............................................................................................................................10
5 Final Solution Overview........................................................................................................11
5.1 Solution introduction.......................................................................................................11
5.2 Solution high-level description........................................................................................12
5.3 Business brief...................................................................................................................14
6 Stakeholders...........................................................................................................................16
6.1 Stakeholder management matrix (Preliminary)...............................................................17
6.2 Stakeholder communication matrix (Preliminary)..........................................................19
7 Solution Technologies...........................................................................................................22
8 Software..................................................................................................................................22
9 Data management and Database..........................................................................................22
9.1 Data management/Data Integrity.....................................................................................24
9.2 Backup Strategy...............................................................................................................26
9.3 DBMS..............................................................................................................................29
9.4 Database Management.....................................................................................................30
10 Business Issues......................................................................................................................32
10.1 Organizational Impacts................................................................................................32
SITP – Case Proposal Report 4
10.1.1 Overview...................................................................................................................32
10.1.2 Organizational Structure...........................................................................................32
10.1.3 Business Processes....................................................................................................32
10.1.4 Change Management................................................................................................33
10.2 Business Continuity......................................................................................................33
10.2.1 Overview...................................................................................................................33
10.2.2 Risks.........................................................................................................................33
10.2.3 Backup Strategy........................................................................................................33
10.2.4 Disaster Recovery.....................................................................................................33
10.2.5 Business Continuity Strategy during Implementation..............................................33
10.3 Staffing and Training...................................................................................................33
10.3.1 Overview...................................................................................................................33
10.3.2 Staff Requirements...................................................................................................34
10.3.3 Training Programs....................................................................................................37
11 Project Management..............................................................................................................38
11.1 High level overview of rollout.....................................................................................38
11.2 Project Implementation strategy...................................................................................38
11.3 Project Plan..................................................................................................................38
11.4 Project Management.....................................................................................................38
11.5 Project Risks and Risk Management............................................................................39
11.6 Support.........................................................................................................................39
11.6.1 Overview...................................................................................................................39
11.6.2 Implementation Support...........................................................................................40
11.6.3 Long Term Support...................................................................................................42
12 Costs.......................................................................................................................................43
12.1 Overview......................................................................................................................43
12.2 Initial Costs..................................................................................................................44
12.3 Solution Infrastructure Costs........................................................................................45
12.4 Solution Implementation Costs....................................................................................47
12.5 Recurring Costs............................................................................................................48
10.1.1 Overview...................................................................................................................32
10.1.2 Organizational Structure...........................................................................................32
10.1.3 Business Processes....................................................................................................32
10.1.4 Change Management................................................................................................33
10.2 Business Continuity......................................................................................................33
10.2.1 Overview...................................................................................................................33
10.2.2 Risks.........................................................................................................................33
10.2.3 Backup Strategy........................................................................................................33
10.2.4 Disaster Recovery.....................................................................................................33
10.2.5 Business Continuity Strategy during Implementation..............................................33
10.3 Staffing and Training...................................................................................................33
10.3.1 Overview...................................................................................................................33
10.3.2 Staff Requirements...................................................................................................34
10.3.3 Training Programs....................................................................................................37
11 Project Management..............................................................................................................38
11.1 High level overview of rollout.....................................................................................38
11.2 Project Implementation strategy...................................................................................38
11.3 Project Plan..................................................................................................................38
11.4 Project Management.....................................................................................................38
11.5 Project Risks and Risk Management............................................................................39
11.6 Support.........................................................................................................................39
11.6.1 Overview...................................................................................................................39
11.6.2 Implementation Support...........................................................................................40
11.6.3 Long Term Support...................................................................................................42
12 Costs.......................................................................................................................................43
12.1 Overview......................................................................................................................43
12.2 Initial Costs..................................................................................................................44
12.3 Solution Infrastructure Costs........................................................................................45
12.4 Solution Implementation Costs....................................................................................47
12.5 Recurring Costs............................................................................................................48
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 5
12.6 Total Cost.....................................................................................................................49
References.....................................................................................................................................51
Appendixes....................................................................................................................................55
Appendix C – Data flow Diagram..............................................................................................55
Appendix D – Entity Relationship Diagram..............................................................................56
12.6 Total Cost.....................................................................................................................49
References.....................................................................................................................................51
Appendixes....................................................................................................................................55
Appendix C – Data flow Diagram..............................................................................................55
Appendix D – Entity Relationship Diagram..............................................................................56
SITP – Case Proposal Report 6
List of Tables
Table: Table 1: Data to perform backup on basis of their priority...............................................28
List of Tables
Table: Table 1: Data to perform backup on basis of their priority...............................................28
SITP – Case Proposal Report 7
List of Figures
Figure 1: Coins-to-card system.....................................................................................................13
Figure 2: High-level design...........................................................................................................14
Figure 3: Architecture for three tier architecture of DBMS.........................................................31
Figure 4: Three tier client/server approach of Database management........................................32
Figure 5: Interrelation between different drivers..........................................................................40
Figure 6: Cost Analysis.................................................................................................................43
Figure 7: Determinants of project cost.........................................................................................44
Figure 8: Initial Costs for the project............................................................................................45
Figure 9: Solution Infrastructure Cost Changing Factors............................................................46
Figure 10: Solution Infrastructure Cost for the Project................................................................46
Figure 11: Cost Changing Factor of Project................................................................................47
Figure 12: Solution Implementation of Project.............................................................................48
Figure 13: Recurring Cost of the Project......................................................................................48
Figure 14: Total Cost of the Coin Management Project...............................................................49
Figure 15: Total Cost for the Project.............................................................................................49
List of Figures
Figure 1: Coins-to-card system.....................................................................................................13
Figure 2: High-level design...........................................................................................................14
Figure 3: Architecture for three tier architecture of DBMS.........................................................31
Figure 4: Three tier client/server approach of Database management........................................32
Figure 5: Interrelation between different drivers..........................................................................40
Figure 6: Cost Analysis.................................................................................................................43
Figure 7: Determinants of project cost.........................................................................................44
Figure 8: Initial Costs for the project............................................................................................45
Figure 9: Solution Infrastructure Cost Changing Factors............................................................46
Figure 10: Solution Infrastructure Cost for the Project................................................................46
Figure 11: Cost Changing Factor of Project................................................................................47
Figure 12: Solution Implementation of Project.............................................................................48
Figure 13: Recurring Cost of the Project......................................................................................48
Figure 14: Total Cost of the Coin Management Project...............................................................49
Figure 15: Total Cost for the Project.............................................................................................49
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 8
SITP – Case Proposal Report
1 MANAGEMENT SUMMARY
The paper mainly reflects on the project of coin currency replacement by establishing new
technology as well as software for providing proper online purchase as well as banking system. It
is identified that the utilization of coin currency creates number of challenges as well as issues
within the market. It is found that the coin currency cannot be eliminated easily from the market
as it is supported by both the consumers as well as government. In addition to this, it is found
that the cost of production as well as transportation of coin currency is quite high. In order to
resolve all the issues, it is quite important to establish coin to card system. It is found that the
establishment of the system will not only be helpful in resolving issues but also assists in
replacing the traditional system of carrying coins. The developed system is dependent on the
server that will be helpful in controlling all the transactions as well as validity procedures. The
system is considered as one of the centralized system that assists in providing all the functions. It
is identified that the project not only helps in eliminating the coin currency from the society but
also assists in making the purchase with the help of advanced technology.
In order to develop the “Coin to Card System” it is identified that the management of the
organization needs to assume various needs as well as requirements of the project in order to
make the use of the system successful. The assumptions that are made include:
The project must be completed successfully within the estimated time as well as budget
All the stakeholders of the project must be able to work effectively for making the project
successful
All the risks that are associated with the project can be mitigated quite easily
The developed system will be helpful in eliminating the use of coin currency and will
enhance the utilization of advanced technology for transaction
SITP – Case Proposal Report
1 MANAGEMENT SUMMARY
The paper mainly reflects on the project of coin currency replacement by establishing new
technology as well as software for providing proper online purchase as well as banking system. It
is identified that the utilization of coin currency creates number of challenges as well as issues
within the market. It is found that the coin currency cannot be eliminated easily from the market
as it is supported by both the consumers as well as government. In addition to this, it is found
that the cost of production as well as transportation of coin currency is quite high. In order to
resolve all the issues, it is quite important to establish coin to card system. It is found that the
establishment of the system will not only be helpful in resolving issues but also assists in
replacing the traditional system of carrying coins. The developed system is dependent on the
server that will be helpful in controlling all the transactions as well as validity procedures. The
system is considered as one of the centralized system that assists in providing all the functions. It
is identified that the project not only helps in eliminating the coin currency from the society but
also assists in making the purchase with the help of advanced technology.
In order to develop the “Coin to Card System” it is identified that the management of the
organization needs to assume various needs as well as requirements of the project in order to
make the use of the system successful. The assumptions that are made include:
The project must be completed successfully within the estimated time as well as budget
All the stakeholders of the project must be able to work effectively for making the project
successful
All the risks that are associated with the project can be mitigated quite easily
The developed system will be helpful in eliminating the use of coin currency and will
enhance the utilization of advanced technology for transaction
SITP – Case Proposal Report 9
SITP – Case Proposal Report 10
2 BACKGROUND
2 BACKGROUND
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 11
3 SCOPE AND ASSUMPTION
3.1 SCOPE
3.1.1 IN SCOPE
3.1.2 OUT OF SCOPE
3.2 ASSUMPTIONS
3 SCOPE AND ASSUMPTION
3.1 SCOPE
3.1.1 IN SCOPE
3.1.2 OUT OF SCOPE
3.2 ASSUMPTIONS
SITP – Case Proposal Report 12
4 OBJECTIVES
The project is mainly focused on replacing the coin currency and decrease the production
cost from it. This is accompanied by establishing new technology and advanced software’s to
provide better online banking as well as purchase. The following are the main objectives of
thereport:
1) Establish a plan to remove coin usage – The study primary focus is to establish anew
plan for removing coin system. Coin comprises of several issues in market and currency.
Especially coins are used in low-value purchase an item. But as compared to thepaper
currency they are not effective in value and transportation. Paper currency is high value
and also light to carry in any places. So this study establishes anew plan which facilitates
all resources to develop anew system that eliminates coin currency.
2) Identification of challenges in removing acoin from theeconomy–Coin currency is not
easily eliminated as it supported by thegovernment as large consumers. The trend now
establishes on making business with acoin in themarket. So there are different challenges
to overcome coin currency. Sothis objective focuses on key challenges and obstacles to
establishing anew system that will eliminate coin currency.
3) Collection of software and hardware for creating anew system–The report also
focuses on assembling effective hardware and software to provide support for thenew
system on progress. This is accompanied by adopting latest technological advancement in
currency. Suitable hardware and software provide aframework for developing and
supporting new payment system. The management within aninternal environment
includes theuse of advanced software that will facilitate thenew system to work.
4) Workforce management–Study also establishes a plan for managing aworkforce to
provide anecessary resource for thenew system. Only skilled and trained workforces are
familiar with new technology concerning the establishment of new technology. Sothe
other objective is workforce assembling to provide all the required resource for maintains
the system which will result in upgrading the system with thelatest technology.
5) Promote card use–This is themain objective of thestudy to introduce card system in
currency. The traditional market on coin currency producesa lot of issues and yet card
4 OBJECTIVES
The project is mainly focused on replacing the coin currency and decrease the production
cost from it. This is accompanied by establishing new technology and advanced software’s to
provide better online banking as well as purchase. The following are the main objectives of
thereport:
1) Establish a plan to remove coin usage – The study primary focus is to establish anew
plan for removing coin system. Coin comprises of several issues in market and currency.
Especially coins are used in low-value purchase an item. But as compared to thepaper
currency they are not effective in value and transportation. Paper currency is high value
and also light to carry in any places. So this study establishes anew plan which facilitates
all resources to develop anew system that eliminates coin currency.
2) Identification of challenges in removing acoin from theeconomy–Coin currency is not
easily eliminated as it supported by thegovernment as large consumers. The trend now
establishes on making business with acoin in themarket. So there are different challenges
to overcome coin currency. Sothis objective focuses on key challenges and obstacles to
establishing anew system that will eliminate coin currency.
3) Collection of software and hardware for creating anew system–The report also
focuses on assembling effective hardware and software to provide support for thenew
system on progress. This is accompanied by adopting latest technological advancement in
currency. Suitable hardware and software provide aframework for developing and
supporting new payment system. The management within aninternal environment
includes theuse of advanced software that will facilitate thenew system to work.
4) Workforce management–Study also establishes a plan for managing aworkforce to
provide anecessary resource for thenew system. Only skilled and trained workforces are
familiar with new technology concerning the establishment of new technology. Sothe
other objective is workforce assembling to provide all the required resource for maintains
the system which will result in upgrading the system with thelatest technology.
5) Promote card use–This is themain objective of thestudy to introduce card system in
currency. The traditional market on coin currency producesa lot of issues and yet card
SITP – Case Proposal Report 13
system is more effective and reliable. The system is used to establish new situation to
eliminate the use of coin system and promote card system in themarket.
The objective of this report is to focus on the promotion of card use in themarket. This
comes up with challenges and problem to tackle atrend that is developed on coin currency. Most
of the market adopted coin currency form several decades. So to change the system it is very
difficult and diplomatic for consumers. But recent changes in technology and security protocols
over online transaction lead more possibility in online banking and transactions. The study
assembles all kinds of thesystem to incorporate with flexibility in online banking. Thedownfalls
of economic of thecountry with coin production lead to theproblem of huge issues.
5 FINAL SOLUTION OVERVIEW
5.1 SOLUTION INTRODUCTION
The coin is acrucial part of theeconomy as it used in various currency. It is specially used
in small valued item and very useful in thetransaction of small values. But this is not effective in
large transactions and purchase. Every coin cost more the value of their own. Though they are
long lasting than paper currency, coin still got some issues in thecost of production and
transportation of large amount. This is more problematic as there exists both pros and cons of
using coins. This is replaced by using advanced technology or currency system. In Australia,
present currency includes cash and coins, and electronic transactions. Electronic means of
thetransaction is the way in which debit card, credit cards are used. They are very effective in
purchasing agood in any place where card payment is available. But theproblemarises on an odd
number of purchasing value. This is not provided by theelectronic method, so either buyer has to
contribute change or seller will keep it. This is probably the main problem in past years in which
people are facing thesame problem each day.
The solution for this problem of coin currency is acoins-to-card system (C2C). This is
generally the card similar to adebit card and credit card which is machine readable(Gao,
2000).The system will replace the traditional way of carrying coins and establish anew trend of
thecurrency market. The card is established on some properly added to read on machines as it
comprises of theproperty of debit card or credit cards. The property helps in theintroduction to
fast and reliable technology. Sothis will make arevolution to currency market of present world as
theconsumer does not have to carry coins for their purchase. The access to own money through
system is more effective and reliable. The system is used to establish new situation to
eliminate the use of coin system and promote card system in themarket.
The objective of this report is to focus on the promotion of card use in themarket. This
comes up with challenges and problem to tackle atrend that is developed on coin currency. Most
of the market adopted coin currency form several decades. So to change the system it is very
difficult and diplomatic for consumers. But recent changes in technology and security protocols
over online transaction lead more possibility in online banking and transactions. The study
assembles all kinds of thesystem to incorporate with flexibility in online banking. Thedownfalls
of economic of thecountry with coin production lead to theproblem of huge issues.
5 FINAL SOLUTION OVERVIEW
5.1 SOLUTION INTRODUCTION
The coin is acrucial part of theeconomy as it used in various currency. It is specially used
in small valued item and very useful in thetransaction of small values. But this is not effective in
large transactions and purchase. Every coin cost more the value of their own. Though they are
long lasting than paper currency, coin still got some issues in thecost of production and
transportation of large amount. This is more problematic as there exists both pros and cons of
using coins. This is replaced by using advanced technology or currency system. In Australia,
present currency includes cash and coins, and electronic transactions. Electronic means of
thetransaction is the way in which debit card, credit cards are used. They are very effective in
purchasing agood in any place where card payment is available. But theproblemarises on an odd
number of purchasing value. This is not provided by theelectronic method, so either buyer has to
contribute change or seller will keep it. This is probably the main problem in past years in which
people are facing thesame problem each day.
The solution for this problem of coin currency is acoins-to-card system (C2C). This is
generally the card similar to adebit card and credit card which is machine readable(Gao,
2000).The system will replace the traditional way of carrying coins and establish anew trend of
thecurrency market. The card is established on some properly added to read on machines as it
comprises of theproperty of debit card or credit cards. The property helps in theintroduction to
fast and reliable technology. Sothis will make arevolution to currency market of present world as
theconsumer does not have to carry coins for their purchase. The access to own money through
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 14
card provide consumer to save their money on every purchase(Upade, 2015). This will also
create balanced economy between market and consumer as theexact value should be paid. This
will create abalance between consumer and seller in themarket to establish flexibility in business.
5.2 SOLUTION HIGH-LEVEL DESCRIPTION
Coins–to-cards system (C2C) is based on themain server which will control all
transactions, cards and validity process. It is the main part of thesystem as it comprises of all
kind of controlled management on the basis of software and hardware. Different PoS devices are
connected to cash counter of retailer and vendors which is directly linked to themain server. The
mechanism of card relies on thecard which is connected to customer bank account. Instant
adding of money is avery complicated process of making apurchase as it produces different
issues. The customer has to deal with third party organization to update their account balance.
This system also provides the functionality of return of change in customer account or card. The
change should be return at the same time of purchase. The customer does not have to carry all
their debit/ credit card as thesystemis connected to all bank accounts of thecustomer to provide
one system operation function.
The systems provide acentralized system to provide all function from thesame place. The
software and hardware in theserverare optimized and regularly maintained. This is very
important as aserver have to integrate new user database, bank account information and customer
activity. This is growing as people are interested in adopting new technologies. The operating
system of theserver is based on latest technology that will support thetransaction and make
theconnection of bank accounts.The server based on top security protocol as it comprises of all
bank account information and user database.
The system will integrate devices in theserver that helps in payment of mobile devices
such as BYOD (Bring your device).
card provide consumer to save their money on every purchase(Upade, 2015). This will also
create balanced economy between market and consumer as theexact value should be paid. This
will create abalance between consumer and seller in themarket to establish flexibility in business.
5.2 SOLUTION HIGH-LEVEL DESCRIPTION
Coins–to-cards system (C2C) is based on themain server which will control all
transactions, cards and validity process. It is the main part of thesystem as it comprises of all
kind of controlled management on the basis of software and hardware. Different PoS devices are
connected to cash counter of retailer and vendors which is directly linked to themain server. The
mechanism of card relies on thecard which is connected to customer bank account. Instant
adding of money is avery complicated process of making apurchase as it produces different
issues. The customer has to deal with third party organization to update their account balance.
This system also provides the functionality of return of change in customer account or card. The
change should be return at the same time of purchase. The customer does not have to carry all
their debit/ credit card as thesystemis connected to all bank accounts of thecustomer to provide
one system operation function.
The systems provide acentralized system to provide all function from thesame place. The
software and hardware in theserverare optimized and regularly maintained. This is very
important as aserver have to integrate new user database, bank account information and customer
activity. This is growing as people are interested in adopting new technologies. The operating
system of theserver is based on latest technology that will support thetransaction and make
theconnection of bank accounts.The server based on top security protocol as it comprises of all
bank account information and user database.
The system will integrate devices in theserver that helps in payment of mobile devices
such as BYOD (Bring your device).
SITP – Case Proposal Report 15
Figure 1: Coins-to-card system
Above figure show working mechanism of C2C system the main server control bank
account of customer and database to provide updates and facility in each use of thecard. But for
the server to operate more functionally, it will need thesupport of bank account of customer and
their database. This will provide arapid update of thecustomer. The above cycle shows as if there
are no bank account connection and customer database the server did not work. The server
hardware and software design on the basis of their operating system and each component
connected. The server best work with update information of thecustomer and their databases.
Any lacks in update information slow the process and issues in card operation. This is fast
processing process as it updatesall information and makes stability in customer database profile.
This system is very effective in connection with abank account to use money and also
advantageous in next level market.
Server
Figure 1: Coins-to-card system
Above figure show working mechanism of C2C system the main server control bank
account of customer and database to provide updates and facility in each use of thecard. But for
the server to operate more functionally, it will need thesupport of bank account of customer and
their database. This will provide arapid update of thecustomer. The above cycle shows as if there
are no bank account connection and customer database the server did not work. The server
hardware and software design on the basis of their operating system and each component
connected. The server best work with update information of thecustomer and their databases.
Any lacks in update information slow the process and issues in card operation. This is fast
processing process as it updatesall information and makes stability in customer database profile.
This system is very effective in connection with abank account to use money and also
advantageous in next level market.
Server
SITP – Case Proposal Report 16
Figure 2: High-level design
Above figure shows high-level design in which study focuses on developinganew system
to eliminate coin currency. In this design,government authorizes all the transactions that will
help in accessing bank balance of customers. Corporation to each component provides
functioning of thesystem as well as maintenance. In this model, each transaction is authorized
and does not contain any issues related to finance.
5.3 BUSINESS BRIEF
In the present day, most of the purchase is accompanied by different methods such as
cash, cheque, and electronic means. As compared to traditional method of purchasing paper and
coin currency was used. This is the most effective methods of purchasing or marketing process
on the basis of selling and buying. But there exists some problem with high-value item
purchases. In case of paper currency, alarge amount of money is required to make apurchase. So
there is theemergence of anelectronic method of paying; that includes debit/credit cards, BPAY
and EFTPOS(Sivaradje et al., 2000). This is most effective in making apurchase as thecustomer
Figure 2: High-level design
Above figure shows high-level design in which study focuses on developinganew system
to eliminate coin currency. In this design,government authorizes all the transactions that will
help in accessing bank balance of customers. Corporation to each component provides
functioning of thesystem as well as maintenance. In this model, each transaction is authorized
and does not contain any issues related to finance.
5.3 BUSINESS BRIEF
In the present day, most of the purchase is accompanied by different methods such as
cash, cheque, and electronic means. As compared to traditional method of purchasing paper and
coin currency was used. This is the most effective methods of purchasing or marketing process
on the basis of selling and buying. But there exists some problem with high-value item
purchases. In case of paper currency, alarge amount of money is required to make apurchase. So
there is theemergence of anelectronic method of paying; that includes debit/credit cards, BPAY
and EFTPOS(Sivaradje et al., 2000). This is most effective in making apurchase as thecustomer
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 17
does not have to carry a lot of money to purchase. The coin currencies from the beginning have
several advantages as it is more effective than paper currency. Paper currency is not waterproof
and long-lasting. As compared to paper currency, coin currency is very effective as it consists of
many advantages. In case of electronic payment, there are difficulties in paying small value items
and also in case of change money. Most ofthe electronic payment system work on even number
payment and does not make payment of odd numbers. In this case, buyer and seller experience
problem in making achange every time.
This is amost frequent problem in themost developed country as well as in Australia. The
study focuses on developing anew technology known as Coins-to-Cards (C2C) system. This is
based on the technology similar to debit/credit card that is readable. The server is the core system
in which all the activities are controlled. Software and hardware are the operating systems of
theserver. The main server comprises of OS based on software and hardware that will
incorporate the whole system run with defined operating principle. By using thecard,the
customer is connected to their bank accounts instantly to make apurchase. The customer only
needs aC2C card to carry as additional change is instantly transferred to their cards. The
customer each transaction is approved by thegovernment. The relation between government and
bank will create flexibility in making thetransaction more efficient and ease.
The C2C system is focused on developing business on the basis of service provided to
thecustomer. The flexibility of system helps each customer to make purchase product on
anytime. The main purpose of thesystem is to eliminate coin currency to provide some advanced
technology to make purchases. Coins are very effective on small value purchase but contain
anissue in making ahigher purchase. The production costs of thecoin are also very high and make
lag in theeconomic value of thecountry. The cost production of one coin is higher than its value;
this will create economic downfall as it lasts for longer period of times. With the use of C2C
cared the society is free of coin currency. This will give ease to thecustomer for making
aneffortless purchase on product and strong network of thetransaction. The establishment of coin
production will reduce the budget of government. The production of thecoin will ultimately lead
to reducing the economic values. So this is not just profit for thecustomer but as a whole nation
can make progress in currency and contribute in saving theeconomy of thecountry. Most of the
coin and paper currency making different problem associated with threats. This is most common
does not have to carry a lot of money to purchase. The coin currencies from the beginning have
several advantages as it is more effective than paper currency. Paper currency is not waterproof
and long-lasting. As compared to paper currency, coin currency is very effective as it consists of
many advantages. In case of electronic payment, there are difficulties in paying small value items
and also in case of change money. Most ofthe electronic payment system work on even number
payment and does not make payment of odd numbers. In this case, buyer and seller experience
problem in making achange every time.
This is amost frequent problem in themost developed country as well as in Australia. The
study focuses on developing anew technology known as Coins-to-Cards (C2C) system. This is
based on the technology similar to debit/credit card that is readable. The server is the core system
in which all the activities are controlled. Software and hardware are the operating systems of
theserver. The main server comprises of OS based on software and hardware that will
incorporate the whole system run with defined operating principle. By using thecard,the
customer is connected to their bank accounts instantly to make apurchase. The customer only
needs aC2C card to carry as additional change is instantly transferred to their cards. The
customer each transaction is approved by thegovernment. The relation between government and
bank will create flexibility in making thetransaction more efficient and ease.
The C2C system is focused on developing business on the basis of service provided to
thecustomer. The flexibility of system helps each customer to make purchase product on
anytime. The main purpose of thesystem is to eliminate coin currency to provide some advanced
technology to make purchases. Coins are very effective on small value purchase but contain
anissue in making ahigher purchase. The production costs of thecoin are also very high and make
lag in theeconomic value of thecountry. The cost production of one coin is higher than its value;
this will create economic downfall as it lasts for longer period of times. With the use of C2C
cared the society is free of coin currency. This will give ease to thecustomer for making
aneffortless purchase on product and strong network of thetransaction. The establishment of coin
production will reduce the budget of government. The production of thecoin will ultimately lead
to reducing the economic values. So this is not just profit for thecustomer but as a whole nation
can make progress in currency and contribute in saving theeconomy of thecountry. Most of the
coin and paper currency making different problem associated with threats. This is most common
SITP – Case Proposal Report 18
problem privacy over money. The extensive use of coin in small value item will lead to
thecreation of this system to provide all costumers more advancement in purchasing.
C2C system is most advanced technology based on thetransaction from customer bank
with theauthorization of government. Using debit/credit card cannot make thelow valued item.
The transaction is instant using customer bank account(Yilmazkuday & Yazgan, 2009). The C2C
system has the facility to make thetransaction from thedifferent account of thecustomer if one
balance runs out. This will make unique from another payment method. The customer is notified
when there is minimum balance limit. In this case, there is no extra charge for thetransaction
from adifferent bank account. The study design high-level frameworks to maintain the system.
The system is operated on cloud-based software known as Software as a Service (SaaS)(Chou et
al., 2014). The software comprises of cardholder, merchant, government and bank to corporate
each other to stabilize the system. This area of management is controlled by software to provide
constant service and facility. The C2C system incorporates with anadvanced interface to provide
thecustomer with thesmooth and rapid processing of thesystem. There are mainly two interfaces
for each controls different sector such as POS system interface control the basic retail system and
Bank software system interface control transaction record, statements, and bank accounts. The
POS system is developed to make atransaction with C2C cards and also helps in retail sales and
tracking of inventory. As for the bank software system, interface associated with online banking,
and update of record of transactions (Whitteker, 2014).
The project is based on eliminating the coin currency from the society and makes
apurchase from advanced technology. The customer is themain focus of this project as they make
adecision based on adoption to new technology or stick to traditional methods. The economics of
thecountry is also influenced by coin production as it lasts for several decades. So government
should be more concern about this technology and payment system to provide access to promote
thetechnology. In developing countries, this is even more problematic in case of economic
downfall. The effort of government and technology only promote this system.
6 STAKEHOLDERS
A stakeholderis defined as individual or group who are interested in theorganization.
They are concerned about all activities of theorganization to get involved. Stakeholders may be
within the organization such as project manager, project sponsor, executives, resource manager
problem privacy over money. The extensive use of coin in small value item will lead to
thecreation of this system to provide all costumers more advancement in purchasing.
C2C system is most advanced technology based on thetransaction from customer bank
with theauthorization of government. Using debit/credit card cannot make thelow valued item.
The transaction is instant using customer bank account(Yilmazkuday & Yazgan, 2009). The C2C
system has the facility to make thetransaction from thedifferent account of thecustomer if one
balance runs out. This will make unique from another payment method. The customer is notified
when there is minimum balance limit. In this case, there is no extra charge for thetransaction
from adifferent bank account. The study design high-level frameworks to maintain the system.
The system is operated on cloud-based software known as Software as a Service (SaaS)(Chou et
al., 2014). The software comprises of cardholder, merchant, government and bank to corporate
each other to stabilize the system. This area of management is controlled by software to provide
constant service and facility. The C2C system incorporates with anadvanced interface to provide
thecustomer with thesmooth and rapid processing of thesystem. There are mainly two interfaces
for each controls different sector such as POS system interface control the basic retail system and
Bank software system interface control transaction record, statements, and bank accounts. The
POS system is developed to make atransaction with C2C cards and also helps in retail sales and
tracking of inventory. As for the bank software system, interface associated with online banking,
and update of record of transactions (Whitteker, 2014).
The project is based on eliminating the coin currency from the society and makes
apurchase from advanced technology. The customer is themain focus of this project as they make
adecision based on adoption to new technology or stick to traditional methods. The economics of
thecountry is also influenced by coin production as it lasts for several decades. So government
should be more concern about this technology and payment system to provide access to promote
thetechnology. In developing countries, this is even more problematic in case of economic
downfall. The effort of government and technology only promote this system.
6 STAKEHOLDERS
A stakeholderis defined as individual or group who are interested in theorganization.
They are concerned about all activities of theorganization to get involved. Stakeholders may be
within the organization such as project manager, project sponsor, executives, resource manager
SITP – Case Proposal Report 19
etc. and of outside the organization such as investors, customers. There are mainly three types of
stakeholder; thefirst type is related to astakeholder who is affected by organization decision and
activities. Another type includes who are not affected by organization’s decision or indirectly
affected. Now key stakeholder are one that is concerned with each decision and activities; they
also have the authority for changing the decision or act accordingly (Ward & Chapman, 2008).
The project is concerned with theintroduction of new technology to replace coin
currency. The coinis mainly used in small value item purchase. But it has different disadvantages
such as transportation of high amount and weight. The main issue is the production cost of
thecoin which is higher than its original value. Coin system only makes worsen the economic
condition of thenation. This is replaced by using new technology such as coin-to-card system.
This is similar to debit/credit card but can purchase small value item through abank account. The
elimination of coin currency will help that finance to use in other sectors of nations. The system
consists of bank, server, merchant, government and card holder. The server controls and process
all data and logical activities to give service to all customer.
6.1 STAKEHOLDER MANAGEMENT MATRIX (PRELIMINARY)
Stakeholder management matrix is concerned with stakeholder analysis based on their
interest to plan, program and other activities of theproject. The potential stakeholder for
theprojectincludes top management, project team, manager, peers, resource manager,
government, and contractors and suppliers as presented in table given below.
etc. and of outside the organization such as investors, customers. There are mainly three types of
stakeholder; thefirst type is related to astakeholder who is affected by organization decision and
activities. Another type includes who are not affected by organization’s decision or indirectly
affected. Now key stakeholder are one that is concerned with each decision and activities; they
also have the authority for changing the decision or act accordingly (Ward & Chapman, 2008).
The project is concerned with theintroduction of new technology to replace coin
currency. The coinis mainly used in small value item purchase. But it has different disadvantages
such as transportation of high amount and weight. The main issue is the production cost of
thecoin which is higher than its original value. Coin system only makes worsen the economic
condition of thenation. This is replaced by using new technology such as coin-to-card system.
This is similar to debit/credit card but can purchase small value item through abank account. The
elimination of coin currency will help that finance to use in other sectors of nations. The system
consists of bank, server, merchant, government and card holder. The server controls and process
all data and logical activities to give service to all customer.
6.1 STAKEHOLDER MANAGEMENT MATRIX (PRELIMINARY)
Stakeholder management matrix is concerned with stakeholder analysis based on their
interest to plan, program and other activities of theproject. The potential stakeholder for
theprojectincludes top management, project team, manager, peers, resource manager,
government, and contractors and suppliers as presented in table given below.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 20
Stakeholder Management Matrix (Preliminary)
Stakeholders Importance Influence &
Power (L,H)
Interest/ Positive
impacts (L,H)
Concerns/negative impacts
Top
management
Direct strategy and development
Controls the project team and whole
strategy
H H Focused on profit business
Misuse of customer database
Project team Implementation of project and execution of
strategy
H L Lag in strategy implementation
and personal issues in project
Manager Decide flow of project and strategy H L Target profit by less investment
Peers Project development and scale up progress L H Misuse project data and strategy
for other purposes
Resource
manager
Control resource for project and maintain
supply chain
H L Cost reduction to make profit
and fluctuate supply chain of
resource
Government Provide legal status and platform for
operation of project
H L Increase tax rates and control
over major activities.
Contractor &
suppliers
Completion of task and supply resources L H Time lag on completing thetask
and unstable supply of resources.
Stakeholder Management Matrix (Preliminary)
Stakeholders Importance Influence &
Power (L,H)
Interest/ Positive
impacts (L,H)
Concerns/negative impacts
Top
management
Direct strategy and development
Controls the project team and whole
strategy
H H Focused on profit business
Misuse of customer database
Project team Implementation of project and execution of
strategy
H L Lag in strategy implementation
and personal issues in project
Manager Decide flow of project and strategy H L Target profit by less investment
Peers Project development and scale up progress L H Misuse project data and strategy
for other purposes
Resource
manager
Control resource for project and maintain
supply chain
H L Cost reduction to make profit
and fluctuate supply chain of
resource
Government Provide legal status and platform for
operation of project
H L Increase tax rates and control
over major activities.
Contractor &
suppliers
Completion of task and supply resources L H Time lag on completing thetask
and unstable supply of resources.
SITP – Case Proposal Report 21
SITP – Case Proposal Report 22
6.2 STAKEHOLDER COMMUNICATION MATRIX (PRELIMINARY)
It is associated with abusiness communication plan to execute the work. For the project,
this is very important to provide project status updates. The communication matrix will help in
updating business analysis and different activities within theproject.
6.2 STAKEHOLDER COMMUNICATION MATRIX (PRELIMINARY)
It is associated with abusiness communication plan to execute the work. For the project,
this is very important to provide project status updates. The communication matrix will help in
updating business analysis and different activities within theproject.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 23
Stakeholder Communication Matrix (Preliminary)
Stakeholder Communication
objective
Format Frequency Owner Feedback
mechanism
Cost
(L,M,H
)
Importanc
e
(L,M,H)
Internal
Top
management
Announcement of
meetings and business
works
Email, the
Internet and
social media
As needed President Email, phone L H
Project team Better performance and
implementation of plans
Email, social
media and
formal talk
Monthly Project
manager
Email,
Social media
M H
Manager Announcement of
meetings and plans
Email, social
media, phone
As needed Project
manager
Email M H
Peers Understanding project
and avoid risks
Phone, Email,
formal talk
As needed HR
Manager
Email L M
Resource
manager
Control resource and
maintain supply
Announcement of
meeting
Email, Phone,
social media
Monthly President Email, phone L H
Stakeholder Communication Matrix (Preliminary)
Stakeholder Communication
objective
Format Frequency Owner Feedback
mechanism
Cost
(L,M,H
)
Importanc
e
(L,M,H)
Internal
Top
management
Announcement of
meetings and business
works
Email, the
Internet and
social media
As needed President Email, phone L H
Project team Better performance and
implementation of plans
Email, social
media and
formal talk
Monthly Project
manager
Email,
Social media
M H
Manager Announcement of
meetings and plans
Email, social
media, phone
As needed Project
manager
Email M H
Peers Understanding project
and avoid risks
Phone, Email,
formal talk
As needed HR
Manager
Email L M
Resource
manager
Control resource and
maintain supply
Announcement of
meeting
Email, Phone,
social media
Monthly President Email, phone L H
SITP – Case Proposal Report 24
External
Government Negotiation and legal
activities concerning
business policy
Email As needed President Email L M
Contractor and
suppliers
Update progress and
maintain resource
Announcement of
meetings
Email, Phone,
social media
and formal
talk
Monthly Project
manager
Email,
phone,
Social media
L M
External
Government Negotiation and legal
activities concerning
business policy
Email As needed President Email L M
Contractor and
suppliers
Update progress and
maintain resource
Announcement of
meetings
Email, Phone,
social media
and formal
talk
Monthly Project
manager
Email,
phone,
Social media
L M
SITP – Case Proposal Report 25
7 SOLUTION TECHNOLOGIES
8 SOFTWARE
9 DATA MANAGEMENT AND DATABASE
9.1 DATA MANAGEMENT/DATA INTEGRITY
9.2 BACKUP STRATEGY
9.3 DBMS
9.4 DATABASE MANAGEMENT
10 BUSINESS ISSUES
10.1 ORGANIZATIONAL IMPACTS
10.1.1 OVERVIEW
10.1.2 ORGANIZATIONAL STRUCTURE
10.1.3 BUSINESS PROCESSES
10.1.4 CHANGE MANAGEMENT
7 SOLUTION TECHNOLOGIES
8 SOFTWARE
9 DATA MANAGEMENT AND DATABASE
9.1 DATA MANAGEMENT/DATA INTEGRITY
9.2 BACKUP STRATEGY
9.3 DBMS
9.4 DATABASE MANAGEMENT
10 BUSINESS ISSUES
10.1 ORGANIZATIONAL IMPACTS
10.1.1 OVERVIEW
10.1.2 ORGANIZATIONAL STRUCTURE
10.1.3 BUSINESS PROCESSES
10.1.4 CHANGE MANAGEMENT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 26
10.2 BUSINESS CONTINUITY
10.2.1 OVERVIEW
10.2.2 RISKS
10.2.3 BACKUP STRATEGY
10.2.4 DISASTER RECOVERY
10.2.5 BUSINESS CONTINUITY STRATEGY DURING IMPLEMENTATION
10.3 STAFFING AND TRAINING
10.3.1 OVERVIEW
10.3.2 STAFF REQUIREMENTS
10.3.3 TRAINING PROGRAMS
11 PROJECT MANAGEMENT
11.1 HIGH LEVEL OVERVIEW OF ROLLOUT
Money installment is right now most famous shape in regular installment framework on the
planet.
- Currently money installment includes 75% - 95% of all exchanges are paid in real money.
- Transactions are paid in a money shape, (for example, $ charge) from a purchaser to a merchant
(Bhujade et al. 2017). An electronic money installment framework for the most part is created in
view of an electronic installment convention which underpins a progression of installment
exchanges utilizing electronic tokens or coins issued by an outsider.
There are three sorts of clients:
- A payer or customer
- A payee, for example, a trader
10.2 BUSINESS CONTINUITY
10.2.1 OVERVIEW
10.2.2 RISKS
10.2.3 BACKUP STRATEGY
10.2.4 DISASTER RECOVERY
10.2.5 BUSINESS CONTINUITY STRATEGY DURING IMPLEMENTATION
10.3 STAFFING AND TRAINING
10.3.1 OVERVIEW
10.3.2 STAFF REQUIREMENTS
10.3.3 TRAINING PROGRAMS
11 PROJECT MANAGEMENT
11.1 HIGH LEVEL OVERVIEW OF ROLLOUT
Money installment is right now most famous shape in regular installment framework on the
planet.
- Currently money installment includes 75% - 95% of all exchanges are paid in real money.
- Transactions are paid in a money shape, (for example, $ charge) from a purchaser to a merchant
(Bhujade et al. 2017). An electronic money installment framework for the most part is created in
view of an electronic installment convention which underpins a progression of installment
exchanges utilizing electronic tokens or coins issued by an outsider.
There are three sorts of clients:
- A payer or customer
- A payee, for example, a trader
SITP – Case Proposal Report 27
- A money related system with which both payer and payee have accounts.
The fundamental qualities of money installment by SITP Inc:
- Acceptability: Cash generally satisfactory as a type of installment, despite the exchange sum.
- Guaranteed installment: money ensures the installment after the exchange is over. There is no
danger of it been dismissed or bobbed.
- No exchange charges:
Money is taken care of from purchasers to merchants with no exchange charges (Botha, 2016).
- Anonymity: numerous different types of installment include a paper trail connecting either or
the two gatherings with the exchanges. Money permits exchanges take put secretly. Performing
artists associated with the task
Clients: Customers utilize the advanced money installment frameworks to make buys.
- Dealers: Dealers need to hold up under the expenses of installment exchanges.
- Providers for computerized installment frameworks: Suppliers are middle people amongst
merchants and money related organizations. They give administrations and preparing.
- Development merchants for advanced installment frameworks:
- Financial establishments: Managing an account frameworks or associations who utilize
electronic installment frameworks.
- Trust Centers: They control computerized signature keys, and help to secure client trust in
certain installment frameworks. They are in charge of the honesty of transmitted information and
realness of temporary workers.
Requirements
Advanced cash: Installment frameworks must give clients and private family units with
satisfactory advanced cash.
- Security: Guarantee the security of exchanges and data protection of clients.
- Scalability: Countless and simultaneous exchanges ought to be taken care of in a adaptable
way.
- Efficient and compelling: Installment frameworks must help productive and successful
installment preparing and bookkeeping administrations for little installment exchanges.
- Simple and lost cost: Installment frameworks must furnish clients with basic and minimal effort
straightforward exchanges.
- A money related system with which both payer and payee have accounts.
The fundamental qualities of money installment by SITP Inc:
- Acceptability: Cash generally satisfactory as a type of installment, despite the exchange sum.
- Guaranteed installment: money ensures the installment after the exchange is over. There is no
danger of it been dismissed or bobbed.
- No exchange charges:
Money is taken care of from purchasers to merchants with no exchange charges (Botha, 2016).
- Anonymity: numerous different types of installment include a paper trail connecting either or
the two gatherings with the exchanges. Money permits exchanges take put secretly. Performing
artists associated with the task
Clients: Customers utilize the advanced money installment frameworks to make buys.
- Dealers: Dealers need to hold up under the expenses of installment exchanges.
- Providers for computerized installment frameworks: Suppliers are middle people amongst
merchants and money related organizations. They give administrations and preparing.
- Development merchants for advanced installment frameworks:
- Financial establishments: Managing an account frameworks or associations who utilize
electronic installment frameworks.
- Trust Centers: They control computerized signature keys, and help to secure client trust in
certain installment frameworks. They are in charge of the honesty of transmitted information and
realness of temporary workers.
Requirements
Advanced cash: Installment frameworks must give clients and private family units with
satisfactory advanced cash.
- Security: Guarantee the security of exchanges and data protection of clients.
- Scalability: Countless and simultaneous exchanges ought to be taken care of in a adaptable
way.
- Efficient and compelling: Installment frameworks must help productive and successful
installment preparing and bookkeeping administrations for little installment exchanges.
- Simple and lost cost: Installment frameworks must furnish clients with basic and minimal effort
straightforward exchanges.
SITP – Case Proposal Report 28
More often than not, clients wish to remain mysterious for every included exchange
- Double spending: Computerized coins comprises of various bits. Installment frameworks must
have the capacity to perceive as well as counteract rehashed installments with the same advanced
coin.
- Exchange: Computerized cash ought to be convertible into "genuine" cash at whatever point
essential.
- Store: Advanced cash must be put away locally on hard circles or other media.
- Value: Computerized money installment frameworks must give a substantial number of
advanced coins for flow and perform verification checking.
Spared time: Reduce exchange process time
- Speed up exchange forms
- Reduced expenses:
- Reduce exchange costs
- Reduce money dissemination costs
- Flexibility:
- Digital money can take many structures, including prepaid cards
- Digital money can be changed over into various monetary forms
- Reduce money appropriation hazard:
- Reduce the normal money dispersion hazard
- Error free and effective:
- Reduce exchange errors
11.2 PROJECT IMPLEMENTATION STRATEGY
Three members are associated with Ecash installment demonstrates: customers, dealers and
banks.
- Client wallet programming:
- customers have Ecash wallet programming (cyberwllet) on their PCs.
- they can utilize Ecoins in their wallet to make buys from dealers.
- pull back coins from their records in an Ecash bank.
- store and deal with customer's coins, track all exchanges.
- Merchant programming:
More often than not, clients wish to remain mysterious for every included exchange
- Double spending: Computerized coins comprises of various bits. Installment frameworks must
have the capacity to perceive as well as counteract rehashed installments with the same advanced
coin.
- Exchange: Computerized cash ought to be convertible into "genuine" cash at whatever point
essential.
- Store: Advanced cash must be put away locally on hard circles or other media.
- Value: Computerized money installment frameworks must give a substantial number of
advanced coins for flow and perform verification checking.
Spared time: Reduce exchange process time
- Speed up exchange forms
- Reduced expenses:
- Reduce exchange costs
- Reduce money dissemination costs
- Flexibility:
- Digital money can take many structures, including prepaid cards
- Digital money can be changed over into various monetary forms
- Reduce money appropriation hazard:
- Reduce the normal money dispersion hazard
- Error free and effective:
- Reduce exchange errors
11.2 PROJECT IMPLEMENTATION STRATEGY
Three members are associated with Ecash installment demonstrates: customers, dealers and
banks.
- Client wallet programming:
- customers have Ecash wallet programming (cyberwllet) on their PCs.
- they can utilize Ecoins in their wallet to make buys from dealers.
- pull back coins from their records in an Ecash bank.
- store and deal with customer's coins, track all exchanges.
- Merchant programming:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 29
- acknowledge and process installments
- collaborate with Ecash bank to perform approval and confirmation
- offer things and create receipts.
- Banks: customers and traders have accounts at an Ecash bank.
- oversee and keep up records of customers and traders.
Three members are engaged with NetCash installment demonstrates:
tbuyers (or customers), traders, and cash servers.
Four administrations are given:
- Verifying coins, to avoid twofold spending.
- Issuing coins as a byproduct of installment by electronic check.
- Buying back coins, giving an electronic check consequently.
- Exchanging legitimate coins for new ones with some secrecy.
NetCheque is proposed to give the electronic check foundation required to bring
money related an incentive into and out of the NetCash framework.
Clients can purchase and offer NetCash coins in return for electronic checks.
- NetCash servers can utilize electronic checks to settle obligations between themselves,
Since advanced card holder Coin was declared, the group of SITP Inc behind it has done a
considerable measure of considering (Bosch et al. 2015). To fight extortion, they've executed a
discretionary morse code opening framework. In order to help make the more than 20,000 Coins
pre-requested, the organization poached Apple's iPhone store network fellow. For getting
enhance Coin's two-year battery life, the gadget's attractive strip now just turns on at the
millisecond it's being swiped. Coin even enlisted two outside security firms to review their whole
operation from the back to front, and fabricated a framework that could enable each Coin to send
a special code string to check each exchange, which would "destroy" extortion.
In any case, Coin is a long way from wrapped up. The gadget was set to send, yet starting today,
Coin just works at 85 percent of charge card terminals. The rest of the 15 percent compare to
edge cases, since each Mastercard terminal is extraordinary (Brawner & Ososky, 2015). Simply
this month, for instance, the organization made some fixes to make Coin more dependable at
ATM machines that eat your card. The objective is to achieve 100 percent, obviously, so today
the organization is messaging its supporters to inquire as to whether they'll enable test to coin
- acknowledge and process installments
- collaborate with Ecash bank to perform approval and confirmation
- offer things and create receipts.
- Banks: customers and traders have accounts at an Ecash bank.
- oversee and keep up records of customers and traders.
Three members are engaged with NetCash installment demonstrates:
tbuyers (or customers), traders, and cash servers.
Four administrations are given:
- Verifying coins, to avoid twofold spending.
- Issuing coins as a byproduct of installment by electronic check.
- Buying back coins, giving an electronic check consequently.
- Exchanging legitimate coins for new ones with some secrecy.
NetCheque is proposed to give the electronic check foundation required to bring
money related an incentive into and out of the NetCash framework.
Clients can purchase and offer NetCash coins in return for electronic checks.
- NetCash servers can utilize electronic checks to settle obligations between themselves,
Since advanced card holder Coin was declared, the group of SITP Inc behind it has done a
considerable measure of considering (Bosch et al. 2015). To fight extortion, they've executed a
discretionary morse code opening framework. In order to help make the more than 20,000 Coins
pre-requested, the organization poached Apple's iPhone store network fellow. For getting
enhance Coin's two-year battery life, the gadget's attractive strip now just turns on at the
millisecond it's being swiped. Coin even enlisted two outside security firms to review their whole
operation from the back to front, and fabricated a framework that could enable each Coin to send
a special code string to check each exchange, which would "destroy" extortion.
In any case, Coin is a long way from wrapped up. The gadget was set to send, yet starting today,
Coin just works at 85 percent of charge card terminals. The rest of the 15 percent compare to
edge cases, since each Mastercard terminal is extraordinary (Brawner & Ososky, 2015). Simply
this month, for instance, the organization made some fixes to make Coin more dependable at
ATM machines that eat your card. The objective is to achieve 100 percent, obviously, so today
the organization is messaging its supporters to inquire as to whether they'll enable test to coin
SITP – Case Proposal Report 30
throughout the following couple of months, and report back on how it's functioning. 10,000
benefactors will be acknowledged into the program.
11.3 PROJECT PLAN
The select in "Coin Beta" program has a fascinating wrinkle, be that as it may. To get Coin
model months early, it is needed to give up the last retail Coin you requested. Be that as it may,
in the event that you need to supplant your beta Coin with the genuine article when it sends this
spring, the organization will offer you one at 70 percent off (Hu, Huo & Qin, 2017). Also, Coin
Beta analyzers will get 50 percent off any Coin items they purchase over next three years, which
could incorporate extra Coins or different adornments.
Coin's new beta analyzers will supplement the road groups as of now sent in San Francisco, Los
Angeles, and New York City, who have been going from store to store testing Coin. "We've
effectively looked at each niche and corner of San Francisco, so our across the nation beta will
be a decent approach to make sense of where something is contrary," "No one has made
something like this sometime recently, so we can't read about the lessons others have adapted."
Already, notwithstanding, Coin appears to work truly well. It is not a solitary beta analyzer
hitherto has had their Coin dismissed by a clerk or server. At that point 30 minutes demoing the
whole Coin on boarding process for me. Subsequently, he took me to a bodega to demonstrate
that Coin works in reality. At that point, I attempted Coin myself at an ATM.
So, Coin works in market. Everything begins with the Coin application, which dispatches on
August 28th for iOS and September 25th for Android. Utilizing a Square-like card peruser that
boats with Coin, you can swipe your cards one by one into the application. At that point, you can
flick through them all in a slick Rolodex-like interface, and pick which eight cards you need to
exchange to your Coin. When it is prepared, it can be push down for a couple of moments on
Coin's catch to begin adjusting cards once again Bluetooth. The procedure is unfathomably basic,
and gives some early eludes to what Coin may do past offering computerized cards. Coin may be
the best of any organization yet at really supplanting your wallet.
"It's more an advanced business framework than a card framework,” "What we're truly working
here is an arrangement of customers who put stock in our framework and can use our framework
to do exchanges (Choi et al. 2014). That empowers us to utilize any innovation to do the genuine
throughout the following couple of months, and report back on how it's functioning. 10,000
benefactors will be acknowledged into the program.
11.3 PROJECT PLAN
The select in "Coin Beta" program has a fascinating wrinkle, be that as it may. To get Coin
model months early, it is needed to give up the last retail Coin you requested. Be that as it may,
in the event that you need to supplant your beta Coin with the genuine article when it sends this
spring, the organization will offer you one at 70 percent off (Hu, Huo & Qin, 2017). Also, Coin
Beta analyzers will get 50 percent off any Coin items they purchase over next three years, which
could incorporate extra Coins or different adornments.
Coin's new beta analyzers will supplement the road groups as of now sent in San Francisco, Los
Angeles, and New York City, who have been going from store to store testing Coin. "We've
effectively looked at each niche and corner of San Francisco, so our across the nation beta will
be a decent approach to make sense of where something is contrary," "No one has made
something like this sometime recently, so we can't read about the lessons others have adapted."
Already, notwithstanding, Coin appears to work truly well. It is not a solitary beta analyzer
hitherto has had their Coin dismissed by a clerk or server. At that point 30 minutes demoing the
whole Coin on boarding process for me. Subsequently, he took me to a bodega to demonstrate
that Coin works in reality. At that point, I attempted Coin myself at an ATM.
So, Coin works in market. Everything begins with the Coin application, which dispatches on
August 28th for iOS and September 25th for Android. Utilizing a Square-like card peruser that
boats with Coin, you can swipe your cards one by one into the application. At that point, you can
flick through them all in a slick Rolodex-like interface, and pick which eight cards you need to
exchange to your Coin. When it is prepared, it can be push down for a couple of moments on
Coin's catch to begin adjusting cards once again Bluetooth. The procedure is unfathomably basic,
and gives some early eludes to what Coin may do past offering computerized cards. Coin may be
the best of any organization yet at really supplanting your wallet.
"It's more an advanced business framework than a card framework,” "What we're truly working
here is an arrangement of customers who put stock in our framework and can use our framework
to do exchanges (Choi et al. 2014). That empowers us to utilize any innovation to do the genuine
SITP – Case Proposal Report 31
transmission." And, you can add any number of cards to the Coin application — even enrollment
cards and protection cards that don't have attractive strips. People can envision a future where the
Coin application or even Coin itself gives you a chance to monitor every one of your "cards" and
even pay over NFC or Bluetooth. "
The institutional plans identified with the installment instrument may present some degree of
settlement hazard. Since computerized money exchanges are intended to recreate money
exchanges, settlement is for the most part brisk, and now and again, quick. Most systems are
composed with the end goal that there is no expansion of credit for settlement. Along these lines,
at first glance, there might be little liquidity or credit chance presented by the framework. In any
case, outsider establishments that offer help for the utilization of computerized monetary forms
may need to oversee liquidity in computerized monetary standards and at least one sovereign
monetary standard, particularly as end clients’ load or discharge their computerized cash wallets
through transformations to or from sovereign monetary forms (Duran & Sabate, 2016). Along
these lines, these organizations need to oversee liquidity successfully keeping in mind the end
goal to execute exchanges in the interest of clients, perhaps bringing some settlement chance into
the framework. The relative secrecy of advanced monetary forms may make them particularly
vulnerable to cash washing and other criminal exercises. The value of computerized cash for
such purposes will depend on how much record-keeping the system keeps up about the
exchanges, how included outsider specialist co-ops are in the exchanges, regardless of whether
such outsiders consent to hostile to illegal tax avoidance prerequisites, and that it is so natural to
move advanced cash crosswise over fringes and change over that money into sovereign cash. A
more profound investigation of the subtle elements of conveyed records could give more data
about the effect of this innovation on retail installment frameworks, their working and related
dangers.
The conveyed record innovation basic numerous advanced cash plans could have a substantially
more extensive application past installments. Decentralized components that trade esteem in light
of a circulated record innovation change the essential setup of total and mesh on which numerous
FMIs depend. Specifically, it is possible that appropriated records could affect the promising of
insurance or on the enlistment of offers, bonds, subsidiaries exchanges and different resources.
The utilization of appropriated records may likewise initiate changes in exchanging, clearing and
settlement as they could cultivate disintermediation of conventional specialist organizations in
transmission." And, you can add any number of cards to the Coin application — even enrollment
cards and protection cards that don't have attractive strips. People can envision a future where the
Coin application or even Coin itself gives you a chance to monitor every one of your "cards" and
even pay over NFC or Bluetooth. "
The institutional plans identified with the installment instrument may present some degree of
settlement hazard. Since computerized money exchanges are intended to recreate money
exchanges, settlement is for the most part brisk, and now and again, quick. Most systems are
composed with the end goal that there is no expansion of credit for settlement. Along these lines,
at first glance, there might be little liquidity or credit chance presented by the framework. In any
case, outsider establishments that offer help for the utilization of computerized monetary forms
may need to oversee liquidity in computerized monetary standards and at least one sovereign
monetary standard, particularly as end clients’ load or discharge their computerized cash wallets
through transformations to or from sovereign monetary forms (Duran & Sabate, 2016). Along
these lines, these organizations need to oversee liquidity successfully keeping in mind the end
goal to execute exchanges in the interest of clients, perhaps bringing some settlement chance into
the framework. The relative secrecy of advanced monetary forms may make them particularly
vulnerable to cash washing and other criminal exercises. The value of computerized cash for
such purposes will depend on how much record-keeping the system keeps up about the
exchanges, how included outsider specialist co-ops are in the exchanges, regardless of whether
such outsiders consent to hostile to illegal tax avoidance prerequisites, and that it is so natural to
move advanced cash crosswise over fringes and change over that money into sovereign cash. A
more profound investigation of the subtle elements of conveyed records could give more data
about the effect of this innovation on retail installment frameworks, their working and related
dangers.
The conveyed record innovation basic numerous advanced cash plans could have a substantially
more extensive application past installments. Decentralized components that trade esteem in light
of a circulated record innovation change the essential setup of total and mesh on which numerous
FMIs depend. Specifically, it is possible that appropriated records could affect the promising of
insurance or on the enlistment of offers, bonds, subsidiaries exchanges and different resources.
The utilization of appropriated records may likewise initiate changes in exchanging, clearing and
settlement as they could cultivate disintermediation of conventional specialist organizations in
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 32
different markets and foundations. These progressions may bring about a potential effect on
FMIs past retail installment frameworks, for example, extensive esteem installment frameworks,
focal securities safes, securities settlement frameworks or exchange archives. The improvement
of "shrewd" contracts in light of circulated record innovation fit for executing installments under
specific conditions may make the likelihood of making variety edge installments on an
individual contract premise. This could fundamentally modify how respective margining and
clearing functions today, with net positions and insurance pools. CPMI give an account of
computerized monetary forms.
Advanced monetary standards and innovation in view of dispersed records could, if broadly
utilized, challenge the
Intermediation part of current on-screen characters in the budgetary framework, particularly
banks. Banks are budgetary mediators that satisfy a part as designated screen of borrowers for
the benefit of investors. Banks too normally perform liquidity and development change in the
directing of cash from contributors to borrowers. In the event that advanced monetary forms and
disseminated records were to end up plainly across the board, any following disintermediation
may affect the instruments for sparing or getting to credit. It is vague who might take up the parts
of customary money related go-betweens in an economy in light of the utilization of these plans
or whether these administrations could be given at all in such a specific circumstance.
11.4 PROJECT MANAGEMENT
11.4.1 PROJECT PLANNING
Task Name Duration Start Finish Resource Names
Development of coin to
card system 139 days Tue 10/3/17 Fri 4/13/18
Initiation phase 16 days Tue 10/3/17 Tue 10/24/17
Developing business
case 4 days Tue 10/3/17 Fri 10/6/17 Business analyst,
Project manager
Undertaking feasibility
study 5 days Mon 10/9/17 Fri 10/13/17
Business analyst,
Project planner,
Resource manager
different markets and foundations. These progressions may bring about a potential effect on
FMIs past retail installment frameworks, for example, extensive esteem installment frameworks,
focal securities safes, securities settlement frameworks or exchange archives. The improvement
of "shrewd" contracts in light of circulated record innovation fit for executing installments under
specific conditions may make the likelihood of making variety edge installments on an
individual contract premise. This could fundamentally modify how respective margining and
clearing functions today, with net positions and insurance pools. CPMI give an account of
computerized monetary forms.
Advanced monetary standards and innovation in view of dispersed records could, if broadly
utilized, challenge the
Intermediation part of current on-screen characters in the budgetary framework, particularly
banks. Banks are budgetary mediators that satisfy a part as designated screen of borrowers for
the benefit of investors. Banks too normally perform liquidity and development change in the
directing of cash from contributors to borrowers. In the event that advanced monetary forms and
disseminated records were to end up plainly across the board, any following disintermediation
may affect the instruments for sparing or getting to credit. It is vague who might take up the parts
of customary money related go-betweens in an economy in light of the utilization of these plans
or whether these administrations could be given at all in such a specific circumstance.
11.4 PROJECT MANAGEMENT
11.4.1 PROJECT PLANNING
Task Name Duration Start Finish Resource Names
Development of coin to
card system 139 days Tue 10/3/17 Fri 4/13/18
Initiation phase 16 days Tue 10/3/17 Tue 10/24/17
Developing business
case 4 days Tue 10/3/17 Fri 10/6/17 Business analyst,
Project manager
Undertaking feasibility
study 5 days Mon 10/9/17 Fri 10/13/17
Business analyst,
Project planner,
Resource manager
SITP – Case Proposal Report 33
Establishing project
charter 3 days Mon 10/16/17 Wed 10/18/17 Business analyst,
Project manager
Appointing the team
members 4 days Thu 10/19/17 Tue 10/24/17 Project manager,
Project planner
Completion of
initiation phase 0 days Tue 10/24/17 Tue 10/24/17
Planning phase 39 days Wed 10/25/17 Mon 12/18/17
Creating project plan 5 days Wed 10/25/17 Tue 10/31/17 Project manager,
Project planner
Creating resource plan 6 days Wed 11/1/17 Wed 11/8/17 Business analyst,
Resource manager
Creating risk planning 7 days Thu 11/9/17 Fri 11/17/17 Project manager,
Risk analyst
Creating quality
planning 5 days Mon 11/20/17 Fri 11/24/17 Project manager,
Project planner
Risk planning 4 days Mon 11/27/17 Thu 11/30/17 Risk analyst
Project acceptance
planning 5 days Fri 12/1/17 Thu 12/7/17 Business analyst,
Project manager
Creating
communication planning of
the project
4 days Fri 12/8/17 Wed 12/13/17 Project manager,
Project planner
creating procurement
planning 3 days Thu 12/14/17 Mon 12/18/17 Business analyst,
Project manager
Completion of
planning phase 0 days Mon 12/18/17 Mon 12/18/17
Project implementation
phase 65 days Tue 12/19/17 Mon 3/19/18
Setting up server 9 days Tue 12/19/17 Fri 12/29/17 Business analyst,
Database
administrator,
Establishing project
charter 3 days Mon 10/16/17 Wed 10/18/17 Business analyst,
Project manager
Appointing the team
members 4 days Thu 10/19/17 Tue 10/24/17 Project manager,
Project planner
Completion of
initiation phase 0 days Tue 10/24/17 Tue 10/24/17
Planning phase 39 days Wed 10/25/17 Mon 12/18/17
Creating project plan 5 days Wed 10/25/17 Tue 10/31/17 Project manager,
Project planner
Creating resource plan 6 days Wed 11/1/17 Wed 11/8/17 Business analyst,
Resource manager
Creating risk planning 7 days Thu 11/9/17 Fri 11/17/17 Project manager,
Risk analyst
Creating quality
planning 5 days Mon 11/20/17 Fri 11/24/17 Project manager,
Project planner
Risk planning 4 days Mon 11/27/17 Thu 11/30/17 Risk analyst
Project acceptance
planning 5 days Fri 12/1/17 Thu 12/7/17 Business analyst,
Project manager
Creating
communication planning of
the project
4 days Fri 12/8/17 Wed 12/13/17 Project manager,
Project planner
creating procurement
planning 3 days Thu 12/14/17 Mon 12/18/17 Business analyst,
Project manager
Completion of
planning phase 0 days Mon 12/18/17 Mon 12/18/17
Project implementation
phase 65 days Tue 12/19/17 Mon 3/19/18
Setting up server 9 days Tue 12/19/17 Fri 12/29/17 Business analyst,
Database
administrator,
SITP – Case Proposal Report 34
Network analyst,
Technical lead
creating connection Pos
devices to the cash counter 8 days Mon 1/1/18 Wed 1/10/18 Network analyst,
Programmer
Developing connection
of card with the bank
account
12 days Thu 1/11/18 Fri 1/26/18 Network analyst,
Technical lead
Integrating user
database, bank information 10 days Mon 1/29/18 Fri 2/9/18
Database
administrator,
Network analyst
Client wallet
programming 9 days Mon 2/12/18 Thu 2/22/18 Programmer
Verifying coins for
avoiding twofold spending 8 days Fri 2/23/18 Tue 3/6/18 Network analyst,
Technical lead
Utilization of Net Cash
servers 9 days Wed 3/7/18 Mon 3/19/18 Technical lead
Completion of
execution phase 0 days Mon 3/19/18 Mon 3/19/18
Maintenance phase 15 days Tue 3/20/18 Mon 4/9/18
Monitoring the
performance of the system 5 days Tue 3/20/18 Mon 3/26/18 Technical lead
Performance of needed
security activities 4 days Tue 3/27/18 Fri 3/30/18 Risk analyst
Management of changes
with the system 6 days Mon 4/2/18 Mon 4/9/18
Database
administrator,
Technical lead
Closure of
maintenance phase 0 days Mon 4/9/18 Mon 4/9/18
Closure phase 4 days Tue 4/10/18 Fri 4/13/18
Reviewing the 2 days Tue 4/10/18 Wed 4/11/18 Project manager,
Network analyst,
Technical lead
creating connection Pos
devices to the cash counter 8 days Mon 1/1/18 Wed 1/10/18 Network analyst,
Programmer
Developing connection
of card with the bank
account
12 days Thu 1/11/18 Fri 1/26/18 Network analyst,
Technical lead
Integrating user
database, bank information 10 days Mon 1/29/18 Fri 2/9/18
Database
administrator,
Network analyst
Client wallet
programming 9 days Mon 2/12/18 Thu 2/22/18 Programmer
Verifying coins for
avoiding twofold spending 8 days Fri 2/23/18 Tue 3/6/18 Network analyst,
Technical lead
Utilization of Net Cash
servers 9 days Wed 3/7/18 Mon 3/19/18 Technical lead
Completion of
execution phase 0 days Mon 3/19/18 Mon 3/19/18
Maintenance phase 15 days Tue 3/20/18 Mon 4/9/18
Monitoring the
performance of the system 5 days Tue 3/20/18 Mon 3/26/18 Technical lead
Performance of needed
security activities 4 days Tue 3/27/18 Fri 3/30/18 Risk analyst
Management of changes
with the system 6 days Mon 4/2/18 Mon 4/9/18
Database
administrator,
Technical lead
Closure of
maintenance phase 0 days Mon 4/9/18 Mon 4/9/18
Closure phase 4 days Tue 4/10/18 Fri 4/13/18
Reviewing the 2 days Tue 4/10/18 Wed 4/11/18 Project manager,
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 35
developed system Technical lead
Documentation 1 day Thu 4/12/18 Thu 4/12/18 Business analyst,
Project manager
Stakeholder's sign off 1 day Fri 4/13/18 Fri 4/13/18 Project manager,
Project planner
Completion of closure
phase 0 days Fri 4/13/18 Fri 4/13/18
developed system Technical lead
Documentation 1 day Thu 4/12/18 Thu 4/12/18 Business analyst,
Project manager
Stakeholder's sign off 1 day Fri 4/13/18 Fri 4/13/18 Project manager,
Project planner
Completion of closure
phase 0 days Fri 4/13/18 Fri 4/13/18
SITP – Case Proposal Report 36
11.4.2 PROJECT TIMEFRAME
Figure 1: Gantt chart
(Source: Created by Author)
11.4.2 PROJECT TIMEFRAME
Figure 1: Gantt chart
(Source: Created by Author)
SITP – Case Proposal Report 37
1.4.3PROJECT MONITORING
The project manager is responsible for monitoring the project. It is identified that they
generally engage in the process of gathering information from different aspects of the project in
order to monitor as well as for checking the progress of the project activities. There are number
of steps that are undertaken by the project manager in order to monitor as well as evaluate the
development of the system “Coin to card”. The steps include:
Monitor the performance of the system: The project manager mainly engages in
monitoring the performance of the system in order to make sure that “coin to card system” is
working properly for reducing the utilization of coin currency.
Performance of needed security activities: The project manager also involves in
monitoring the various security activities that are generally undertaken in order to secure the
information as well as data associated with transactions.
Management of changes with the system: The various changes that are required to be
introduced in order to make the system much more advanced in context with new technology, it
is quite important to monitor the changes of the system properly by the project manager.
11.4.4 PROJECT HUMAN RESOURCES
Resource
Name Type Materia
l Label
Initial
s
Grou
p
Max.
Units
Std.
Rate
Ovt.
Rate
Cost/
Use
Accrue
At
Base
Calenda
r
Business
analyst
Wor
k B 100
%
$40.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Project
manager
Wor
k P 100
%
$50.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Project
planner
Wor
k P 100
%
$45.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Network
analyst
Wor
k N 100
%
$40.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Database
administrato
r
Wor
k D 100
%
$35.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Resource
manager
Wor
k R 100
%
$40.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Risk analyst Wor
k R 100
%
$30.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Programmer Wor
k P 100
%
$35.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Technical Wor T 100 $40.00/ $0.00/ $0.00 Prorate Standard
1.4.3PROJECT MONITORING
The project manager is responsible for monitoring the project. It is identified that they
generally engage in the process of gathering information from different aspects of the project in
order to monitor as well as for checking the progress of the project activities. There are number
of steps that are undertaken by the project manager in order to monitor as well as evaluate the
development of the system “Coin to card”. The steps include:
Monitor the performance of the system: The project manager mainly engages in
monitoring the performance of the system in order to make sure that “coin to card system” is
working properly for reducing the utilization of coin currency.
Performance of needed security activities: The project manager also involves in
monitoring the various security activities that are generally undertaken in order to secure the
information as well as data associated with transactions.
Management of changes with the system: The various changes that are required to be
introduced in order to make the system much more advanced in context with new technology, it
is quite important to monitor the changes of the system properly by the project manager.
11.4.4 PROJECT HUMAN RESOURCES
Resource
Name Type Materia
l Label
Initial
s
Grou
p
Max.
Units
Std.
Rate
Ovt.
Rate
Cost/
Use
Accrue
At
Base
Calenda
r
Business
analyst
Wor
k B 100
%
$40.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Project
manager
Wor
k P 100
%
$50.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Project
planner
Wor
k P 100
%
$45.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Network
analyst
Wor
k N 100
%
$40.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Database
administrato
r
Wor
k D 100
%
$35.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Resource
manager
Wor
k R 100
%
$40.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Risk analyst Wor
k R 100
%
$30.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Programmer Wor
k P 100
%
$35.00/
hr
$0.00/
hr $0.00 Prorate
d Standard
Technical Wor T 100 $40.00/ $0.00/ $0.00 Prorate Standard
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 38
lead k % hr hr d
11.5 PROJECT RISKS AND RISK MANAGEMENT
Ra
nk
Risk Descript
ion
Categ
ory
Root
Cause
Potential
Response
s
Risk
Owner
Probabi
lity
Impa
ct
Statu
s
1 Inaccurat
e set up
of the
server
It is
identified
that due
to
improper
skills and
knowled
ge, the
network
analyst
faces
difficulty
in setting
up the
server
and as a
result the
set up of
the
system is
not done
appropria
tely
which
arises
Hardw
are
risk
Due to
improper
training
of the
technicia
ns as well
as
network
analyst,
the
problem
associate
d with
inappropr
iate set up
of server
occurs. It
is
identified
that
proper
training
facility is
not
provided
Both the
technician
s as well
as
network
analyst
must be
trained
properly
so that
they are
capable
of
understan
ding the
requireme
nts of the
project
properly,
which
further
assists in
mitigating
the
technical
Network
analyst
Mediu
m
High Set
up in
2
mont
hs.
lead k % hr hr d
11.5 PROJECT RISKS AND RISK MANAGEMENT
Ra
nk
Risk Descript
ion
Categ
ory
Root
Cause
Potential
Response
s
Risk
Owner
Probabi
lity
Impa
ct
Statu
s
1 Inaccurat
e set up
of the
server
It is
identified
that due
to
improper
skills and
knowled
ge, the
network
analyst
faces
difficulty
in setting
up the
server
and as a
result the
set up of
the
system is
not done
appropria
tely
which
arises
Hardw
are
risk
Due to
improper
training
of the
technicia
ns as well
as
network
analyst,
the
problem
associate
d with
inappropr
iate set up
of server
occurs. It
is
identified
that
proper
training
facility is
not
provided
Both the
technician
s as well
as
network
analyst
must be
trained
properly
so that
they are
capable
of
understan
ding the
requireme
nts of the
project
properly,
which
further
assists in
mitigating
the
technical
Network
analyst
Mediu
m
High Set
up in
2
mont
hs.
SITP – Case Proposal Report 39
number
of
technical
related
challenge
s within
the
project.
to the
team
members
and as a
result,
they face
number
of
difficultie
s in
executing
the tasks
that are
assigned
to them.
challenge
s.
2
Inaccurat
e
program
ming
It is
identified
that due
to
insufficie
nt
knowled
ge about
the needs
as well
as
requirem
ents of
the
system,
the
program
mers
execute
Softwa
re risk
The
major
root
cause of
inaccurat
e
program
ming is
improper
knowledg
e as well
as
informati
on about
the needs
as well as
requireme
nts of the
project,
The
program
mer must
understan
d the
needs as
well as
requireme
nts of the
project
properly
before
executing
the
program,
as it will
be helpful
in
utilizing
Program
mer
Low High Set
up in
15
days.
number
of
technical
related
challenge
s within
the
project.
to the
team
members
and as a
result,
they face
number
of
difficultie
s in
executing
the tasks
that are
assigned
to them.
challenge
s.
2
Inaccurat
e
program
ming
It is
identified
that due
to
insufficie
nt
knowled
ge about
the needs
as well
as
requirem
ents of
the
system,
the
program
mers
execute
Softwa
re risk
The
major
root
cause of
inaccurat
e
program
ming is
improper
knowledg
e as well
as
informati
on about
the needs
as well as
requireme
nts of the
project,
The
program
mer must
understan
d the
needs as
well as
requireme
nts of the
project
properly
before
executing
the
program,
as it will
be helpful
in
utilizing
Program
mer
Low High Set
up in
15
days.
SITP – Case Proposal Report 40
programs
by using
incorrect
code and
as a
result, it
will
create
major
negative
impact
on the
project.
which
will
create
number
of
technical
issues.
accurate
code that
will
further
helpful in
bringing
positive
outcome
on the
project.
3
Improper
data
managem
ent
If the
data of
the
customer
s project
are not
kept
properly
then
number
of
security
risks as
well as
challenge
s occurs
within
the
organizat
ion
which
Data
risk
It is
identified
that due
to
improper
experienc
e of the
database
administr
ator.
Thus, it is
quite
important
to secure
the data
properly.
Experienc
ed
database
administr
ator must
be hired
so that the
informati
on as well
as data
within the
system is
kept
securely
by
utilizing
proper
authentica
tion
technique
s. This
Databas
e
administr
ator
Mediu
m
Medi
um
set
up in
1
mont
h
programs
by using
incorrect
code and
as a
result, it
will
create
major
negative
impact
on the
project.
which
will
create
number
of
technical
issues.
accurate
code that
will
further
helpful in
bringing
positive
outcome
on the
project.
3
Improper
data
managem
ent
If the
data of
the
customer
s project
are not
kept
properly
then
number
of
security
risks as
well as
challenge
s occurs
within
the
organizat
ion
which
Data
risk
It is
identified
that due
to
improper
experienc
e of the
database
administr
ator.
Thus, it is
quite
important
to secure
the data
properly.
Experienc
ed
database
administr
ator must
be hired
so that the
informati
on as well
as data
within the
system is
kept
securely
by
utilizing
proper
authentica
tion
technique
s. This
Databas
e
administr
ator
Mediu
m
Medi
um
set
up in
1
mont
h
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SITP – Case Proposal Report 41
will
create
negative
impact
on the
progress
of the
project
and the
project
will not
be able
to
complete
d within
the
assumed
time and
budget
will be
helpful in
mitigating
the risk
and also
helps in
avoiding
any type
of
negative
impact on
the
project.
4.
Improper
estimatio
n of
budget
It is
identified
that the
budget
that is
estimated
for the
project is
done
properly
and as a
result the
project
can face
number
Financ
ial risk
Due to
improper
analysis
of project
requireme
nt, the
resource
manager
faces
number
of
difficultie
s in
completin
g all the
The
resource
manager
must
analyze
the
requireme
nts as
well as
needs of
the
project
properly.
After
proper
Resourc
e
manager
High High Set
up in
1
mont
h
will
create
negative
impact
on the
progress
of the
project
and the
project
will not
be able
to
complete
d within
the
assumed
time and
budget
will be
helpful in
mitigating
the risk
and also
helps in
avoiding
any type
of
negative
impact on
the
project.
4.
Improper
estimatio
n of
budget
It is
identified
that the
budget
that is
estimated
for the
project is
done
properly
and as a
result the
project
can face
number
Financ
ial risk
Due to
improper
analysis
of project
requireme
nt, the
resource
manager
faces
number
of
difficultie
s in
completin
g all the
The
resource
manager
must
analyze
the
requireme
nts as
well as
needs of
the
project
properly.
After
proper
Resourc
e
manager
High High Set
up in
1
mont
h
SITP – Case Proposal Report 42
of
financial
challenge
s..
Improper
budget
estimatio
n can
create
financial
pressure.
activities
of the
project
within the
estimated
budget.
analysis,
the
budget
for the
project
must be
made so
that the
project
will be
executed
successful
ly within
the
assumed
budget.
11.6 SUPPORT
11.6.1 OVERVIEW
11.6.2 IMPLEMENTATION SUPPORT
11.6.3 LONG TERM SUPPORT
12 COSTS
12.1 OVERVIEW
12.2 SOLUTION INFRASTRUCTURE COSTS
of
financial
challenge
s..
Improper
budget
estimatio
n can
create
financial
pressure.
activities
of the
project
within the
estimated
budget.
analysis,
the
budget
for the
project
must be
made so
that the
project
will be
executed
successful
ly within
the
assumed
budget.
11.6 SUPPORT
11.6.1 OVERVIEW
11.6.2 IMPLEMENTATION SUPPORT
11.6.3 LONG TERM SUPPORT
12 COSTS
12.1 OVERVIEW
12.2 SOLUTION INFRASTRUCTURE COSTS
SITP – Case Proposal Report 43
12.3 SOLUTION IMPLEMENTATION COSTS
12.4 RECURRING COSTS
12.5 TOTAL COST
REFERENCES
Besner, C., & Hobbs, B. (2012). An empirical identification of project management toolsets and
a comparison among project types. Project Management Journal, 43(5), 24-46.
Besner, C., & Hobbs, B. (2013). Contextualized project management practice: A cluster analysis
of practices and best practices. Project Management Journal, 44(1), 17-34.
Cook, D., Brown, D., Alexander, R., March, R., Morgan, P., Satterthwaite, G., & Pangalos, M.
N. (2014). Lessons learned from the fate of AstraZeneca's drug pipeline: a five-
dimensional framework. Nature reviews. Drug discovery, 13(6), 419.
Crawford, J. K. (2014). Project management maturity model. CRC Press.
Marcelino-Sádaba, S., Pérez-Ezcurdia, A., Lazcano, A. M. E., & Villanueva, P. (2014). Project
risk management methodology for small firms. International Journal of Project
Management, 32(2), 327-340.
Martinelli, R. J., & Milosevic, D. Z. (2016). Project management toolbox: tools and techniques
for the practicing project manager. John Wiley & Sons.
McLeod, L., Doolin, B., & MacDonell, S. G. (2012). A perspective‐based understanding of
project success. Project Management Journal, 43(5), 68-86.
Serra, C. E. M., & Kunc, M. (2015). Benefits realisation management and its influence on
project success and on the execution of business strategies. International Journal of
Project Management, 33(1), 53-66.
Berthold, M.R., Borgelt, C., Höppner, F. & Klawonn, F. (2010) Guide to Intelligent Data
Analysis.
Botha, R.A. & Eloff, J.H.P. (2001) A framework for access control in workflow systems.
Information Management & Computer Security, 9 (3), pp.126–133.
Bradford, C. (2017) How Much Does File Storage Really Cost? [Internet]. Available from:
<https://www.storagecraft.com/blog/file-storage-cost-statistics/> [Accessed 13 September
2017].
12.3 SOLUTION IMPLEMENTATION COSTS
12.4 RECURRING COSTS
12.5 TOTAL COST
REFERENCES
Besner, C., & Hobbs, B. (2012). An empirical identification of project management toolsets and
a comparison among project types. Project Management Journal, 43(5), 24-46.
Besner, C., & Hobbs, B. (2013). Contextualized project management practice: A cluster analysis
of practices and best practices. Project Management Journal, 44(1), 17-34.
Cook, D., Brown, D., Alexander, R., March, R., Morgan, P., Satterthwaite, G., & Pangalos, M.
N. (2014). Lessons learned from the fate of AstraZeneca's drug pipeline: a five-
dimensional framework. Nature reviews. Drug discovery, 13(6), 419.
Crawford, J. K. (2014). Project management maturity model. CRC Press.
Marcelino-Sádaba, S., Pérez-Ezcurdia, A., Lazcano, A. M. E., & Villanueva, P. (2014). Project
risk management methodology for small firms. International Journal of Project
Management, 32(2), 327-340.
Martinelli, R. J., & Milosevic, D. Z. (2016). Project management toolbox: tools and techniques
for the practicing project manager. John Wiley & Sons.
McLeod, L., Doolin, B., & MacDonell, S. G. (2012). A perspective‐based understanding of
project success. Project Management Journal, 43(5), 68-86.
Serra, C. E. M., & Kunc, M. (2015). Benefits realisation management and its influence on
project success and on the execution of business strategies. International Journal of
Project Management, 33(1), 53-66.
Berthold, M.R., Borgelt, C., Höppner, F. & Klawonn, F. (2010) Guide to Intelligent Data
Analysis.
Botha, R.A. & Eloff, J.H.P. (2001) A framework for access control in workflow systems.
Information Management & Computer Security, 9 (3), pp.126–133.
Bradford, C. (2017) How Much Does File Storage Really Cost? [Internet]. Available from:
<https://www.storagecraft.com/blog/file-storage-cost-statistics/> [Accessed 13 September
2017].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SITP – Case Proposal Report 44
Chand, S. (2016) Sources of Recruitment of Employees: Internal and External Sources |
Recruitment [Internet]. Available from:
<http://www.yourarticlelibrary.com/recruitment/sources-of-recruitment-of-employees-
internal-and-external-sources-recruitment/25954/> [Accessed 13 September 2017].
Chou, S.-W., Chang, Y.-C. & Hsieh, P.-H. (2014) Understanding the performance of software-
as-a-service based on service-dominant logic. The Service Industries Journal, 34 (7),
pp.645–658.
Christian, R.C. (1961) Challenges of Global Marketing. Journal of Marketing, 25 (4), p.72.
Cloud Security Alliance (2010) Top Threats to Cloud Computing V1.0.
Crump, G. (2008) Full, incremental or differential: How to choose the correct backup type
[Internet]. Available from: <http://searchdatabackup.techtarget.com/feature/Full-
incremental-or-differential-How-to-choose-the-correct-backup-type> [Accessed 13
September 2017].
Damaj, I. & Kasbah, S. (2017) An analysis framework for hardware and software
implementations with applications from cryptography. Computers & Electrical
Engineering.
Dunst, C.J. & Trivette, C.M. (2009) Capacity-Building Family-Systems Intervention Practices.
Journal of Family Social Work, 12 (2), pp.119–143.
Falk, H. (1995) Choosing the best backup method. The Electronic Library, 13 (1), pp.71–74.
Fyfe, J. (1988) Manpower planning and development in an organization. Public Administration
and Development, 8 (3), pp.305–315.
Gao, J. (2000) Electronic Cash Payment Protocols and Systems [Internet]. Available from:
<http://www.engr.sjsu.edu/gaojerry> [Accessed 13 September 2017].
Gordon, K. (2007) Principles of Data Management Facilitating Information Sharing. The British
Computer Society.
Greenberg, D.H. & Appenzeller, U. (1998) Cost Analysis Step by Step: A How-to Guide for
Planners and Providers of Welfare-to-Work and Other Employment and Training
Programs.
Groot, M. (2017) Chapter 4 – Challenges and Trends in the Financial Data Management Agenda.
In: A Primer in Financial Data Management. pp.107–126.
Chand, S. (2016) Sources of Recruitment of Employees: Internal and External Sources |
Recruitment [Internet]. Available from:
<http://www.yourarticlelibrary.com/recruitment/sources-of-recruitment-of-employees-
internal-and-external-sources-recruitment/25954/> [Accessed 13 September 2017].
Chou, S.-W., Chang, Y.-C. & Hsieh, P.-H. (2014) Understanding the performance of software-
as-a-service based on service-dominant logic. The Service Industries Journal, 34 (7),
pp.645–658.
Christian, R.C. (1961) Challenges of Global Marketing. Journal of Marketing, 25 (4), p.72.
Cloud Security Alliance (2010) Top Threats to Cloud Computing V1.0.
Crump, G. (2008) Full, incremental or differential: How to choose the correct backup type
[Internet]. Available from: <http://searchdatabackup.techtarget.com/feature/Full-
incremental-or-differential-How-to-choose-the-correct-backup-type> [Accessed 13
September 2017].
Damaj, I. & Kasbah, S. (2017) An analysis framework for hardware and software
implementations with applications from cryptography. Computers & Electrical
Engineering.
Dunst, C.J. & Trivette, C.M. (2009) Capacity-Building Family-Systems Intervention Practices.
Journal of Family Social Work, 12 (2), pp.119–143.
Falk, H. (1995) Choosing the best backup method. The Electronic Library, 13 (1), pp.71–74.
Fyfe, J. (1988) Manpower planning and development in an organization. Public Administration
and Development, 8 (3), pp.305–315.
Gao, J. (2000) Electronic Cash Payment Protocols and Systems [Internet]. Available from:
<http://www.engr.sjsu.edu/gaojerry> [Accessed 13 September 2017].
Gordon, K. (2007) Principles of Data Management Facilitating Information Sharing. The British
Computer Society.
Greenberg, D.H. & Appenzeller, U. (1998) Cost Analysis Step by Step: A How-to Guide for
Planners and Providers of Welfare-to-Work and Other Employment and Training
Programs.
Groot, M. (2017) Chapter 4 – Challenges and Trends in the Financial Data Management Agenda.
In: A Primer in Financial Data Management. pp.107–126.
SITP – Case Proposal Report 45
Ian (2016) What is an RDBMS? [Internet]. Available from: <http://database.guide/what-is-an-
rdbms/> [Accessed 13 September 2017].
Jade Software Corporation Limited (2016) Developing a Backup Strategy White Paper.
Krouslis, W. (1994) How to Handle Data Loss and Backup. The EDP Audit, Control, and
Security Newsletter, 22 (5), pp.1–6.
Leslie, J.B. (2015) The Leadership Gap: What You Need, And Still Don’t Have When It Comes
To Leadership Talent.
Mah, P. (2014) How to Build a Storage and Backup Strategy for Your Small Business [Internet].
Available from: <https://www.cio.com/article/2378019/small-business/how-to-build-a-
storage-and-backup-strategy-for-your-small-business.html> [Accessed 13 September
2017].
Morgeson, F.P. (2017) The SAGE Encyclopedia of Industrial and Organizational Psychology,
2nd edition. In: S. G. Rogelberg ed. Thousand Oaks, SAGE Publications, Inc, pp.769–
771.
NIRN (2017) Implementation Components That Are Integrated and Compensatory [Internet].
Available from: <http://nirn.fpg.unc.edu/learn-implementation/implementation-drivers/
integrated-compensatory> [Accessed 13 September 2017].
Nivethan, J. & Papa, M. (2016) On the use of open-source firewalls in ICS/SCADA systems.
Information Security Journal: A Global Perspective, 25 (1–3), pp.83–93.
Omidvar, H. (2008) Project Budget and Cost Management.
Bhujade, A., Nandanwar, C., Raut, D., Mangrulkar, K., Wanjari, L., Lokhande, P., & Katare, S.
(2017, February). Automatic Water Dispenser Along With Mobile Charging. In National
Conference on Advances in Engineering and Applied Science (NCAEAS).
Bosch, L., Simanovich, I., & Thorson, K. (2015). VoiceEnable Vending Machine with RFID
Control.
Botha, J. T. (2016). Data security aspects of a debit card system(Doctoral dissertation).
Ian (2016) What is an RDBMS? [Internet]. Available from: <http://database.guide/what-is-an-
rdbms/> [Accessed 13 September 2017].
Jade Software Corporation Limited (2016) Developing a Backup Strategy White Paper.
Krouslis, W. (1994) How to Handle Data Loss and Backup. The EDP Audit, Control, and
Security Newsletter, 22 (5), pp.1–6.
Leslie, J.B. (2015) The Leadership Gap: What You Need, And Still Don’t Have When It Comes
To Leadership Talent.
Mah, P. (2014) How to Build a Storage and Backup Strategy for Your Small Business [Internet].
Available from: <https://www.cio.com/article/2378019/small-business/how-to-build-a-
storage-and-backup-strategy-for-your-small-business.html> [Accessed 13 September
2017].
Morgeson, F.P. (2017) The SAGE Encyclopedia of Industrial and Organizational Psychology,
2nd edition. In: S. G. Rogelberg ed. Thousand Oaks, SAGE Publications, Inc, pp.769–
771.
NIRN (2017) Implementation Components That Are Integrated and Compensatory [Internet].
Available from: <http://nirn.fpg.unc.edu/learn-implementation/implementation-drivers/
integrated-compensatory> [Accessed 13 September 2017].
Nivethan, J. & Papa, M. (2016) On the use of open-source firewalls in ICS/SCADA systems.
Information Security Journal: A Global Perspective, 25 (1–3), pp.83–93.
Omidvar, H. (2008) Project Budget and Cost Management.
Bhujade, A., Nandanwar, C., Raut, D., Mangrulkar, K., Wanjari, L., Lokhande, P., & Katare, S.
(2017, February). Automatic Water Dispenser Along With Mobile Charging. In National
Conference on Advances in Engineering and Applied Science (NCAEAS).
Bosch, L., Simanovich, I., & Thorson, K. (2015). VoiceEnable Vending Machine with RFID
Control.
Botha, J. T. (2016). Data security aspects of a debit card system(Doctoral dissertation).
SITP – Case Proposal Report 46
Brawner, K., & Ososky, S. (2015, August). The GIFT 2015 report card and the state of the
project. In Generalized Intelligent Framework for Tutoring (GIFT) Users Symposium
(GIFTSym3) (p. 137).
Choi, C. H., Joo, B. S., Lee, J. H., & Kim, W. W. (2014, August). Architecture of switch fabric
module in the optic-circuit-packet converged transport network system. In Optical
Internet 2014 (COIN), 2014 12th International Conference on (pp. 1-2). IEEE.
Duran, G., & Sabate, C. (2016). Raspberry Pi 2 Platform for Coin-operated WiFi HotSpot
Kiosk. Imperial Journal of Interdisciplinary Research, 2(12).
Hu, Y., Huo, M., & Qin, G. (2017). The Rail Transportation and Bus Intelligent Connection
Under the Comprehensive Transportation System. In Proceedings of the Second
International Conference on Intelligent Transportation (pp. 57-62). Springer Singapore.
Piening, L. (2011) The Benefits of Data Management [Internet]. Available from:
<http://annuitas.com/blog/2011/02/02/the-benefits-of-data-management/> [Accessed 13
September 2017].
Polonsky, M. (1996) Stakeholder management and the stakeholder matrix: Potential strategic
marketing tools. Journal of Market-Focused Management, 1 (3).
Porter, T.D. (2016) Practical Staff Management Techniques for Distance Education
Coordinators. Journal of Library & Information Services in Distance Learning, 10 (1–2),
pp.41–52.
Post, G. V. & Kagan, A. (2001) Comparison of Database Management Systems. Journal of
Computer Information Systems, 41 (4).
Ranasinghe, M. (1996) Total project cost: a simplified model for decision makers. Construction
Management and Economics, 14 (6), pp.497–505.
Rapaport, W.J. (2005) Implementation is semantic interpretation: further thoughts. Journal of
Experimental & Theoretical Artificial Intelligence, 17 (4), pp.385–417.
Brawner, K., & Ososky, S. (2015, August). The GIFT 2015 report card and the state of the
project. In Generalized Intelligent Framework for Tutoring (GIFT) Users Symposium
(GIFTSym3) (p. 137).
Choi, C. H., Joo, B. S., Lee, J. H., & Kim, W. W. (2014, August). Architecture of switch fabric
module in the optic-circuit-packet converged transport network system. In Optical
Internet 2014 (COIN), 2014 12th International Conference on (pp. 1-2). IEEE.
Duran, G., & Sabate, C. (2016). Raspberry Pi 2 Platform for Coin-operated WiFi HotSpot
Kiosk. Imperial Journal of Interdisciplinary Research, 2(12).
Hu, Y., Huo, M., & Qin, G. (2017). The Rail Transportation and Bus Intelligent Connection
Under the Comprehensive Transportation System. In Proceedings of the Second
International Conference on Intelligent Transportation (pp. 57-62). Springer Singapore.
Piening, L. (2011) The Benefits of Data Management [Internet]. Available from:
<http://annuitas.com/blog/2011/02/02/the-benefits-of-data-management/> [Accessed 13
September 2017].
Polonsky, M. (1996) Stakeholder management and the stakeholder matrix: Potential strategic
marketing tools. Journal of Market-Focused Management, 1 (3).
Porter, T.D. (2016) Practical Staff Management Techniques for Distance Education
Coordinators. Journal of Library & Information Services in Distance Learning, 10 (1–2),
pp.41–52.
Post, G. V. & Kagan, A. (2001) Comparison of Database Management Systems. Journal of
Computer Information Systems, 41 (4).
Ranasinghe, M. (1996) Total project cost: a simplified model for decision makers. Construction
Management and Economics, 14 (6), pp.497–505.
Rapaport, W.J. (2005) Implementation is semantic interpretation: further thoughts. Journal of
Experimental & Theoretical Artificial Intelligence, 17 (4), pp.385–417.
1 out of 46
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.