Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Case

This Module's Case is about how to develop a successful project team. The core of the case is a description of an actual team development situation:

Poole, C. (2003, March 26). Three week project turnaround.

XProgramming.com. (2011). What is extreme programming?

Flynn, A., & Mangione, T. (2011). Five steps to a winning project team.

And then there are pieces of "practice wisdom" on the team development process, such as:

Sherrer, A. (2011, May 31). Six characteristic stages of team development. The Project Management Hut.

Webster, M.. (2011, June 13). Six 5 tips to motivate your project team. The Project Management Hut.

Overall, it seems as though we know a lot about how to create and deploy successful project teams. So why is there such frustration and so many reported failures?

As noted earlier, you should also consult material from the Background Information or related other materials you find yourself (be sure to reference properly whatever specific sources you draw on). You may want to do some further searching in the project management support websites.

Case Assignment
When you've read through the articles and related material, scanned the websites, and thought about it carefully, please prepare a short (4-5 page) paper discussing the question:

"Discuss how IT manager could create and maintain a successful and winning project team"

You should probably be prepared to address issues such as the definition of "success," costs and benefits involved, and who either receives or pays them, sources of pressure on the team and its management, and responsibilities incurred by the various participants.

Assignment Expectations
Your paper should be short (4-6 pages, not including cover sheet and references) and to the point. It is to be structured in the following manner.

You are expected to:
- Begin this paper by stating your position on this question of managerial practices, clearly and concisely
- Citing appropriate sources, present the reasons why you take this position. Be sure to make the most effective case you can. Use the Poole case fol illustrations where possible.
- Then present the best evidence you can, again citing appropriate sources, against your position-that is, establish what counterarguments can be made to your original position.
- Finally, review your original position in light of the counterarguments, showing how they are inadequate to rebut your original statement.
By the end of your paper, you should be able to unequivocally re-affirm your original position.

You will be particularly assessed on:
- Your ability to see what the module is all about and to structure your paper accordingly.
- Your informed commentary and analysis-simply repeating what your sources say does not constitute an adequate paper.
- Your ability to apply the professional language and terminology of communications and information systems correctly and in context; you are expected to be familiar with this language and use it appropriately.
- Your effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments.

SLP

You'll remember that the general project for this term involves creating an implementation plan for the new TUI learning management system, Desire2learn (D2L). You've already had the opportunity to review some project management software; now you'll have the opportunity to begin to put together an actual plan using it.

- For this module, you should think about the people involved in your implementation process. These might include personnel from the vendor, along with University IT staff, administrators, faculty, other staff, and possibly students as well. Who is going to be needed, to do what, when?

- Use your software to incorporate staffing into your project plan; allocate and distribute your personnel resources as you think they will be needed. If you need to make specific assumptions about people or their availability, don't hesitate to do so as long as you keep a record of such assumptions and make them explicit in your write-up. Don't hesitate to contact your professor if you have questions or want to clarify any particular points.

- Finally, prepare a brief (2-3 page) report summarizing your activities regarding the previous two steps -- personnel definition and plan design. Attach your plan report either as a component of the document (not counted against the page requirement). Be as personal and reflective as you can; remember, your aim is to describe what you learned from this process and how it might affect your behavior and your career.

SLP Assignment Expectations

Your paper will be evaluated on the following criteria:

- Complete the SLP assignment. Length of 2-3 pages (since a page is about 300 words, this is approximately 600-900 words)

- Conducted evaluation and analysis as required

- Precision: the questions asked are answered.

- Clarity: Your answers are clear and show your good understanding of the topic.

- Breadth and Depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.

- Critical thinking: Incorporate YOUR reactions, examples, and applications of the material to business that illustrate your reflective judgment and good understanding of the concepts.

- Your paper is well written and the references are properly cited and listed.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92293816
  • Price:- $55

Priced at Now at $55, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

A wall street journal article noted that a study by us

A Wall Street Journal article noted that a study by U.S. Congressional Budget Office "estimated raising the minimum wage to $10.10 per hour reduced U.S employment by 500,000 but lift 900,000 Americans out of poverty". Wh ...

Discussion bulldefine a packet analyzer and describe its

Discussion: • Define a packet analyzer and describe its use • List commonly used packet analyzers (beyond WireShark) • List best practices for analyzing packets • Describe uses (good and bad, ie. hacker) of a packetanaly ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment -global finance inc gfi - global finance inc gfi

Assignment - GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specia ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As