Free Essay


In: Business and Management

Submitted By dgszh
Words 5460
Pages 22
Contents Exclusive summar 1 Check-in Process for XYZ Company 3 Organizational Overview 3 Process overview 3 Detailed process description 4 Membership sign up sub-process (Figure 2) 4 Equipment service sub-process (Figure 3) 5 Transaction and Object 5 Give a general name for this chapter, such as DATA BASE DESIGH 6 Overview of Flow Chart and Data base 6 Give a name here, such as Data Base Detail 10 Court Type (Category table) 10 Employee(Object table) 10 Equipment (Category table) 10 Member (Object table) 11 Membership Type (Category table) 11 Payment (Transaction table) 11 Rental Record (Intersection table) 12 Schedule (Transaction table) 12 Information Technology Controls for XYZ Recreation center 14 ADD A TiTLE, Such s overview of Controls 14 Control Details 14 Control classification zone 15 Type 16 Implementation 17 Metrics 17 Compensating Control 18 Change log 19 PRJ 1 19 PRJ 2 20

Exclusive summary
Going to stadium is an enduring activities among Americans, especially among those college students. Those people are keen to exercise their body day by day. It brings our company, XYZ Stadium, large amount of clients and incomes. What’s more, other organizations are willing to rent our space to hold their activities such as sport event. However, these good news challenge us in management process especially in check-in process which we did not think it over carefully before. To mitigate these problem, our company pushes and implement a sequence of system associated with the check-in process to control and prevent existing and potential risks.

Our check-in system is mainly constituted by a main process and two sub-processes. The main process is a general and simple process which our clients will face directly. It’s an almost automatic process operating and recording by computer system after staffs input required information. Instead, those two sub-processes are more complex and mostly executed by the background staffs. Clients won’t see those processes.

The main Check-In process is carried out at the check-in desk. Staffs there will help customers to check in, rent and schedule equipment and courts. They are responsible to match the clients’ status and their requirements with the data store in a few seconds. One of the sub-process is Membership Sign Up. It will check whether or not a people is an existing client. If the answer is yes, then let the customer enter. Otherwise, the staff will help the person to register his membership. Another sub-process is the Equipment Service. It is carried out after check-in. This process is mainly in charge of rent, collect and maintain equipment.

To support these process, we design a data base. The data base contains eight tables which can be classified into four types. Court Type table, Equipment table and Membership Type table are Category table. Employee table and Member table are Object table. Payment table and Schedule table are Transaction table. And Rental Record table is an Intersection table. All these tables interact with others to generate and control all activities in the Check-in process.

Furthermore, our company has burdened several internal controls in the system to protect properties belonging to us and clients. Authorization system is an Entity level control to prevent all unwelcomed visits. System Backup and Employee ID and Password Control are IT General Control, trying to preventing and protecting our system from any data loss. Fraudulent ID Identification, Stock-out Control and Employee Check-in Manifest are Application level control that rules several activities to offer our customer and employee better experience.

As more and more clients join us, our work will rely on the Information System more and more. The Check-in system may allow us to serve our clients more efficiently and effectively, creating better experience for them.

Check-in Process for XYZ Company
Organizational Overview
XYZ recreation center, founded in 2003, is a local stadium based in Corvallis. This stadium owns 10 basketball courts, 2 soccer courts, 2 cardio rooms, 3 weight rooms and 8 tennis courts and different kinds of equipment for common sports, such as soccer, tennis, basketball and psychical exercises. In a typical year, XYZ serves approximately 300 customers every day. Most of these customers live in or near Corvallis. In addition, it rents place to different organizations to hold events. The center is honor to provide all the clients equipment and courts offering them great experience.

XYZ Company commit themselves to comfort all clients and make sure they have a great exercise journey in its place. The company’s revenue is mainly earned from two parts. One is from renting equipment and courts to clients for regular exercises which provides nearly 6 million dollar per year, almost 70% of its whole profit; and the other one is space rental which is 30% revenue, which is around 2.5 million dollars. In this project, we mainly focus on court regular uses and renting equipment associate with the court.

Process overview
The Check-in process in XYZ Company is mainly about confirm customer’s identity and their needs so that staff can further service them. It relies largely on computer based information system to check customer’s identity and make reservation in a short time.
XYZ stadium has 2 check-in desks in its lobby. Each desk has one computer terminal and a scanner to read the information from membership card. The check-in process stars when a customer enters the stadium and go to the check-in desk. The check-in process contains both human (staff) work and material (computer) resources. In order to complete the check-in process, some procedural tasks need to be accomplished. To ensure customer satisfaction, every step should run smoothly and efficiently.
General speaking, the whole check-in process is to satisfy customers by efficient works. Staffs should provide fast and accurate feedback to meet customers’ requirements, as well as computer system should operate quickly and smoothly.
There are some risks in the Check-in process. The biggest risk will be system breakdown. Because our check-in process is largely relies on the computer system, if it’s crash or goes wrong in some way, the check-in desk is not able to provide customers smooth service which will lower customers’ satisfaction. In order to prevent this risk, staff will maintains the Check-in system every month to make sure it’s working well and can provide data smoothly and quickly. In addition, staff will backups data every day, basically at the end of each day.

Another risk will be illegal log-in. The threat is in some situation, some people may try to access our data without permission. That will lead to lose data. To reduce this risk, every employee have their own ID and password which can effectively prevent illegal log-in.

A customer using an expired membership card or other invalid card to access to facilities is a risk and will bring loss to XYZ. The check-in computer system and membership cards provides customers’ photo and membership expiration date clearly to staff for matching in order to prevent and detect customers with fraudulent ID.

In addition, our equipment may stock-out. That’s happened when we haven’t enough stock to replace broken equipment. This may lower customer satisfaction. To figure this out, we set up safety stock for each equipment in maintenance department. If the amount of an equipment in stock is below the safety stock we set before, the computer system will automatically send an order to warehouse to purchase in order to match the safety stock.

In some situation, employee may lose or forget their ID card so that they cannot enter the system. This will hit the speed of the check-in process which will lower customer satisfaction. In order to give fair and consistent service, employee can enter their ID number and password manually to get access to the computer system.

The last risk is in inner security. Some employee may try to access or change data which they are not be able to. In order to prevent this problem, each time an employee card be scanned, the identity will be recognized. They can access only the data they can access.

Detailed process description
The check-in process (Figure 1) begins when customer arrive at XYZ recreation center and walk up to the check-in desk. The staff at check-in desk greats the customer and then ask the customer to show their membership ID for check-in. If he/she is a valid member, the check-in desk will go ahead to check court status from data store; schedule court for them and notice the staff to prepare court for the customer. If the customer is a new comer, it will goes to a sub-process in Figure 2 about membership sign-up. After schedule court, the staff will ask whether the customer need equipment (such as badminton rackets; basketball or soccer) or not, if yes, there will be a sub-process about equipment service which is shows in Figure 3.

Membership sign up sub-process (Figure 2)
The membership sign up sub-process start from check-in desk ask the customer whether he/she is a member. If not, the check-in desk will lead the customer to membership service center. The membership service center will add the customer as a new member in the data store. At the same time, the membership service center will create a paper invoice and give it to the customer. Then, the customer will pay the invoice. After the staff in membership center receive the payment and record the payment into the data store, he/she will finalize membership and create a membership card for the customer.
After the customer receive the card, he can go ahead to check-in desk to scan ID and access to facilities.

Equipment service sub-process (Figure 3)
The equipment service sub-process begin with staff ask customer whether he/she need to borrow equipment or not. If no, the customer can go ahead to use court and free to go. If the customer want to borrow equipment, then the staff will check the customer’s ID and equipment status and issue equipment to customer. When staff issue the equipment, he/she will create a rental record into data store. For example, the customer want to borrow a basketball, the staff will check the customer’s ID and basketball quantity, and then issue a basketball to the customer. At the same time, write a rental record: “one basketball” into data store for further matching purpose. After issue equipment, the customer can use the court for exercise. When they done their activity, if the customer had borrow an equipment, he/she needs to return the equipment to staff before they leave. After the staff receive the equipment, he/she needs to check whether the equipment need to be maintained or not. If yes, the staff will give the equipment to maintain department. After the maintain department receive the equipment, they will check the equipment to see if it can be fixed or have to be replaced. If it can be fixed, the department will fix it and return it to the staff. Otherwise, the maintain department will make an order and send it to warehouse. The warehouse receive the order and ship the required equipment back, and then, maintain department collect them and return them back to the staff.

Transaction and Object
The Check-in system’s data is stored in tables in a Microsoft Access database.

Object Table:
——The Member table lists customer’s individual information, such as the name, gender, address, contract number and membership type. It is an object table because it is continue exist unless the member’s information change.

——The Employee table lists our employee’s information. It is an object table because it will last a long time period, unless the employee need to be changed. For each employee we record a name, and their position.

Transaction Table:
——The Payment table record customer payments. For each payment, we will record the date, payment method, total amount, and customer pay for. It will change intermediately once the payment have been made.

——The Schedule table record the court use information. It is a transaction because it will change once the customer need to use the court. Each schedule record, we will record the member ID, employee ID, court type, beginning time and ending time.
Give a general name for this chapter, such as DATA BASE DESIGH
Overview of Flow Chart and Data base
Figure 1. Check-in process: The Check-in process in XYZ Company. Two sun-process will be mentioned below

Figure 2. Membership sign up: Include new member sign up and membership data create process.

Figure 3. Equipment service: Include equipment borrowing; returning and maintain process.

Figure 4. Relationship between all tables in access base.

Give a name here, such as Data Base Detail
Court Type (Category table)
The court type table is used to record the variety of courts. It includes a primary key which is “Court type ID”. The Court Type ID is a list of unique numbers to distinguish between different kinds of courts. There is another attribute called “description” which data type is short text to briefly explain the definition of each specific court related to each specific Court Type ID.

Figure 5. Court Type table

Employee(Object table)
Employee table is an object table. It contains a list of employee in this company. The table shows some information about each employee. The primary key is Employee ID. It is used as a unique ID for each staff to help people distinguish them. The Last Name and First Name record together record the full name of names which refer to different Employee ID. And the Position records jobs of different employees.

Figure 6. Employee table

Equipment (Category table)
The equipment table records all kinds of equipment which are available for check out in the company. The primary key of this table is equipment ID. The equipment ID is to give each kind of equipment a unique number for recognition and further record. Another attribute “Description” is to explain each equipment ID meaningfully by each equipment’s name.

Figure 7. Equipment table

Member (Object table)
Member table is an object table. It includes a list of members. The table presents information of each member. The primary key is Member ID which serves as a unique ID for each member to distinguish them. Last Name, First Name, Gender records the natural information of a member. Address, City, State and Phone Number store where the company could contact them. Membership Type ID is a foreign key records which kind of member a customer is from membership type table.

Figure 8. Member table

Membership Type (Category table)
The purpose of Membership type table is to list different membership type base upon customer’s billing cycle in order to decide the payment each time. The primary key of this table is the Membership type ID. It recorded as short text to show three different types of membership related to three billing cycle (monthly; semi-annually; yearly). The other attribute is membership type description to describe the membership type more specifically.

Figure 9. Membership Type table

Payment (Transaction table)
Payment table is another transaction table. This table records the process that a customer pays a bill. Payment ID serves as the primary key while Member ID serves as the foreign key, which could offer more information from certain corresponding tables. In this table, the Payment ID is a unique ID here to differentiate each payment. Member ID is used to identify who rents the court, linking more information from the Member table. The Payment Method depicts how a customer pay a bill. The Total Amount and Payment Date show how much and when a customer pays the bill, respectively. The Description is used to record some note for the payment, such as discount.

Figure 10. Payment table

Rental Record (Intersection table)
Rental Record is an intersection table, containing information about equipment rental. Rental Record ID is the primary key, help staffs distinguish different rentals. Member ID, Employee ID and Equipment ID are foreign keys which link to the corresponding table to give more information about these attributes. Quantity depicts how many items are rented by a customer. Issue Time and Return Time together is used to calculate how an equipment is rented. All these information together present an equipment rental process, help the company to track the situation of each equipment.

Figure 11. Rental Record table
The Rental_Record_Intersection_Table supports a many-to-many relationship between the Member Table, Employee Table and the Euipment Table. The intersection table, itself, is not a list of individual events or objects of interest, rather its purpose is to record an association between items in the other tables. It has its own primary key and has three foreign key attributes, Member ID which points to the primary key of Member Table, Employee ID which points to the Employee Table and Equipment ID which points to the primary key of Equipment Table.

Schedule (Transaction table)
Schedule table is a transaction table which links to Employee table, Court Type table and Member table. It depicts a process that an employee helps a customer book a court. In this table, its primary key is Court ID while Employee ID, Court Type and Member ID serve as foreign key. The Court ID describes is a unique ID to distinguish different court. The Member ID is used to record who borrows the court. The Employee ID records which employee helps to book the court. Beginning Time and Ending Time are recorded to help calculate how long the court is used. The Court Type ID is used to define which kind of court is rented. All these attributes together could help the company to track the status of each court, helping it to better understand and manage its court rental.

Figure 12. Schedule table

Information Technology Controls for XYZ Recreation center
ADD A TiTLE, Such s overview of Controls
The company’s philosophy of XYZ recreation center is making the fitness experience both safety and enjoyable for its customers. XYZ recreation center hire and train high-skill employees and use high quality system and controls to reach this target. The XYZ recreation center’s key goals are to ensure the quality of equipment and site in order to keep customers safe during the using period; to provide fair and consistent customer service; and to ensure XYZ’s process and controls can work effectively to help meeting this goal. The operational strategy in XYZ recreation center includes the implementation of preventative, detective, compensating and corrective controls to enhance the customers’ satisfaction and feeling of safety and well-being. Because our control and operation largely rely on computer, the biggest risk is system break-down. Other risks including illegal and unauthorized log-in; employee mistake specifically during check-in; fraudulent ID identification and equipment stock out. To lighten the risks and threats the following controls are implemented into the XYZ recreation center.

Control Table | Control Name | Control Zone | Type of Control | Implementation | System backup | IT General Control | Corrective | Hybrid | Employee log-in ID and password | IT General Control | Preventive | Automated | Fraudulent ID (Membership card) Identification | Application Control | PreventativeDetective | Hybrid | Stock-out control | Application Control | Detective | Automated | Employee check-in manifest | Application Control | Compensating | Manual | Authorization system | Entity level Control | Preventative | Automated |
Figure 1: XYZ Recreation center risk/threat control table showing individual control classification and implementation types.
Control Details
The system backup control is the first and the most important control to mitigate the risk of system break down which is the biggest and worst risk. The recreation center’s employee backups the databases once a day, basically at the end of the day. Employee will backups all the database in a large hard disk. If unfortunately, the system break down, we can use the backup database to correct it to minimize the possibility of lose data.

The employee log-in ID and password control decrease the risk of illegal log-in. Each employee has a unique ID and their own password. Each time they want to enter the system, they have to put in their ID number and the password relative to it. Only when the ID and the password match, they can enter the system. This control can prevent the risk of steal data and illegal log-in.

The Fraudulent ID (Membership card) Identification control can prevent the risk of customer enter the recreation center under other’s membership card or invalid card. The employee at the check-in desk will scan each customer’s membership card, the computer will identify it in order to make sure he/she has qualification to enter. If the information in the card match the person, he/she can access to the recreation center. Otherwise, he/she will not be able to enter in.

The stock out control can reduce the risk of equipment out of stock. We set up safety stock for each equipment in maintenance department. Each time an equipment is broken and cannot be maintained, we will replace the old one with a new one from the stock in maintenance department. If the amount of an equipment in stock is below the safety stock we set before, the computer system will automatically send an order to warehouse to purchase in order to match the safety stock.

The Employee check-in manifest is a second way for employee log-in. normally, employee can scan their ID card to log-in the system. However, sometimes employee may forget or lose their ID card. In order to give fair and consistent service, employee can enter their ID number and password manually to get access to the computer system.

The Authorization system is used to keep inner security in the XYZ recreation center and everyone has to follow the rule. Each time an employee card be scanned, the identity will be recognized. They can access only the data they can access. For example, manager can access and change every employee’s record but each employee can only see their own record and cannot edit it.

Control classification zone
XYZ stadium control include examples of entity –level controls, application controls, and IT general controls.

By definition, the entity level control is a control which can affect the whole company. Specifically in XYZ recreation center is the authorization system. The Authorization System forces everyone in the organization to follow the “no one can entry any area without permission” rule. For example, normal employee can only access to part of the data and cannot make any change. Managers have higher permission than normal employees so that they have full access to read and change all data.

IT General control includes system back-up and employee ID log-in system. By definition, IT level of control is used to address the IT system risk. The System Back Up is define as an IT control because the company needs to backup all data daily in case of the system break-down and data lose. Also, The Employee Login ID is an IT general control either. Each employee has their own personal ID and password to login the computer which can better to prevent illegal log-in.

Fraudulent ID and stock-out control are regard as Application control. Application control is used to address risk in a specific business application. Fraudulent ID control which is a specific topic in check-in process. Customer will hold their own customer ID to get access the stadium. The stock-out control is a part of application control because it directly associate to the equipment order process. Similarly, the Employee Check-in manifest is also an application control which only relative to the employee check in process.

For the control of the XYZ stadium include preventive, detective, corrective and compensating controls.

The control classified as preventive is that it can effective prevents an illegal and physical enter the system. Base on this definition, we have three way to prevent the illegal enter the system. For the first step, we have Fraudulent ID control, we use this step to prevent the non-customer entry our system. Then, we use Employee Log-in ID system to identify our employee in order to prevent other people get in the system. Finally, we use authorization System to distinguish the different authority so that we can prevent people from access the data which they haven’t permission.

Detective is identify a control that can detect or report errors, omissions and malicious act. XYZ stadium using the Fraudulent ID identify to detective invalid membership card in order to prevent these customers to enter the stadium with invalid card. The Safety Stock Control is an effective method for the maintain department to detect whether the equipment is out of stock. In this case, maintain department will set up safety stock of the equipment in the computer, once a kind of equipment in the maintain department lower than the amount of safety stock we set up before, it will sent the purchase order to the warehouse automatically. (Employee will record the number we purchase and record the number of the equipment we sent to the stadium. The system keep tracking these number of equipment weekly. System will use automated subtract the number we sent to stadium by the purchase and compare this number we set up for the safety stock. If it is lower than the safety stock we set up, it will sent the purchase order to the warehouse.)

Control are classified as corrective when it can remedy problems and minimize the negative effect. The System Back Up is a kind of the Corrective control. As we mention before, our company backup data daily, which can decrease the loss from the system break down and minimize the negative impacts. Compensating control is identify as we have another way to figure out the error. In our system, Employee log-in is defined as compensating control. All employee can log-in the system with either ID card or enter their ID and password manually. If an employee forget their ID card, they can type in their information to get access to the system.

The successful internal control relies extremely on employees and other components implementing their work carefully and strictly.
Manual controls require people to initiate the action. Manual work are used to avoid potential risks during the operating process. Employee Check-in Manifest is a manual control because an employee could input certain code to gain access if he/she left the ID somewhere else.

An automated control is that people just need to follow the system requirements rather than process by themselves. Employee Log-in Control is an automated control because the system will match the employee’s log-in ID and password in its data store to make sure whether this person have access or not. Authorization system Control is another automated control since when a person slides his employee ID card, the system will match his identity and his authorization in the list to decide the level of access. A hybrid control includes steps that requires people to initiate something first then the system will execute it automatically. System Back-up Control is a hybrid control since it requires people to back up whole data first during certain period. If the system break down and is unable to correct, the system will use the back-up data minimize the data lose. Fraudulent ID Control is another hybrid control since the staff will input the Member’s personal information like SSN, home address and photo to the data base first. Then when a person enter the check-in desk and slide their card, the system would match the information in the data base and also the employee will identify whether the person stand in front and in the photo is the same one. The last hybrid control is Stock-out control. This is because a staff will first decide the amount of safety stock and set a safety stock level. After that, when the system detects if the amount of certain equipment is lower than the safety stock level, it will automatically send order to warehouse to replenish the stock. Metrics
When people evaluate the how effective and accurate these controls are accomplished, lead or lag indicators would be usually used as standard. Lead Indicators describe whether or not the processes are being correctly applied. Lag indicators describe the degree to which XYZ’s goals are being accomplished.

System back-up control can be measured by how well the system recover from the last system crash. Because it is different to set a specific goal to evaluate the recovery level byte by byte. People could only evaluated through its general performance. So it would use lead indicator rather than the lag indicator to assess.
The lag indicators is used in Employee Check-in Control since this can be measured clearly by the number of trespass. The ideal goal would be zero which means there is no improper individual to pass the entrance with certain code. Each improper pass will lead the control to be far away from the goal.

The Employee Log-in Control can be measured by the amount of illegal log-in. The ideal goal would be zero which means there is no improper individual to log into the system. Any illegal log-in would result in a worse outcome than before. Clearly, the lag indicator could be the metric to the control.

Authorization control can be measured by how many times the improper happens. The ideal goal would be zero which means there is no improper individual trying to go to an unauthorized zone in the company. Any successful trail would be counted as a bad performance. So the lag indicator could be the metric here.

Fraudulent ID Control can be measured by how many times the Fraudulent ID is successfully pass the check-in process. The ideal goal would be zero which means there is no improper individual successfully enter the stadium with an invalid ID. Any successful trail would be counted as a bad performance. So the lag indicator could be the metric here.

Stock-out control can be measured by how many times stock-out happens. The ideal goal would be zero which means there is always enough equipment in our stock. Any stock-out would be regarded as a failure. So the lag indicator could be the metric here.

Compensating Control
Controls are classified as compensating controls when they are utilized to compensate for another control. The Employee Check-in Manifest is another manual control. This is because an employees could input correct password to enter a door in case of staffs leaving their ID card somewhere else which may lead them not to be able to gain access.

Change log
PRJ 1 * Add and correct some risks in process overview. * Add reference into Sub-process in the Check in Process. * Remove the relationship between the Sign up Membership Sub-process and Member data from the Check in process. * Remove the Equipment table from the Check in process. * Change the Sub-process table’s name to “Equipment service” to match the sub-process name from the Check in process. * Add a new Data store called “Schedule” and connect to “Schedule Court” table in the Check in Process. * Add a new data store called Employee into the sign up Membership process. * Remove the Paper Payment document from the Sign up Membership process. * Add the Scan ID table, and add the relationship between the Scan ID table and Receive Membership ID-Card from the Sign up Membership process. * Add a new data store called Payment into the Sign up Membership process. * Remove the “Need equipment” decision and “Rent Equipment” decision from the Equipment Service process. * Add a connection between the “Use Court” table and “Return Equipment” in Equipment Service process. * Add connection between “Ask customer need equipment or not” to “Check ID” table in Equipment Service process. * Add a connection between “Receive Equipment” and “Rental Record” in Equipment Service process. * Remove the Paper document “Purchase order” from the Equipment Service process, and connect the “Create purchase order” table and “Receive Order” table in Equipment Service process. * Change the name of “Purchase equipment” to “Ship equipment” in Equipment Service process. * Change the name “Maintain Equipment” decision table to “Maintenance” decision table and remove the connection between the “Maintenance” decision table to the End table in Equipment Service process. * Add a new End table and connect to the “Maintenance” decision table table in Equipment Service process. * Rewrite the describe about the “transaction and object”
PRJ 2 * Remove the space from the Table Name. * Add figure name for each table.…...

Similar Documents

Premium Essay


...PROJECT ABSTRACT Project Name your name Project completion date INTRODUCTION Example: Today there are more than 100 animal species on the Endangered Species List in the United states alone. Each year more are added. Due to rescue and repopulation efforts, some animals are removed from the list. During our unit on animal habitat we will study some of these endangered animals and make suggestions for increasing their numbers. TASK(S) Example: IN order to prevent a species from being wiped out, my team and I have been given an area of wilderness land within the United states to build an animal sanctuary. The sanctuary must allow the animals some of the freedoms they would have in the wild, yet keep them with in the 200-acre space. We must also consider the best plan for operating the sanctuary , identifying funding sources, and ensuring ongoing health of the animals. ACTIVITY/PROCESS Example: Our animal * Select an animal from the Endangered species List * Research the animals natural habitat, dietary needs, and predators * Research the reasons why the animal is included on the endangered species List * Determine what might help the animal to prosper Our sanctuary * Determine what type of enclosure will be used to contain the animals within the sanctuary ...

Words: 321 - Pages: 2

Premium Essay


...Chapter 3 Planning the Project This chapter begins by discussing the nine key elements of the project plan. The following two sections address the planning process in greater detail with considerable emphasis placed on the project launch meeting and the hierarchical planning process by which parts of the plan are sequentially broken down into finer levels of detail. This provides a natural transition to the creation of the Work Breakdown Structure. Finally, the chapter is concluded with a discussion of multidisciplinary teams including the topics of integration management and concurrent engineering. Cases and Readings Some cases appropriate to the subject of this chapter are: Harvard: 9-692-058 Taco Bell Corp. This 31-page best-selling case describes a project to implement a new strategic plan involving major changes in layout, staffing, quality, product design, and information systems. The coordination and integration of all these project activities is what makes the plan successful, and hard for competitors to imitate. Two teaching notes are available for this case: 5-692-091 (20 pages) and 5-196-073 (12 pages). Harvard: 9-694-059 Hardcard Project: Plus Development Corp. (A1); 9-694-060 Hardcard Project: Plus Development Corp. (A2) This 10-page (12-pages for A2) case allows the students to evaluate, using Microsoft Project software, the time line, resource allocations, and other aspects of a major project concerned with developing a hard disk drive...

Words: 3660 - Pages: 15

Free Essay


...Several Himalayan geologists have repeatedly expressed apprehension against the massive road  and dam-building construction activity taking place in Uttarakhand which had resulted in the hillsides “crumbling. States oppose Model Flood Bill Even as floods play havoc in Uttarakhand, several states have opposed the provisions of a 38-year-old Model Flood Bill aimed at minimising losses to life and property in the natural calamity. The CWC had circulated the model bill to all the states to help the state governments enact the legislation. Except for Manipur and Rajasthan, no state legislature has enacted the 'Model Bill on Flood Plain Zoning'. Human hand behind flood disaster Ecologists point out that the huge expansion of hydro-power projects and construction of roads to cope with the lakhs of tourists in Uttarakhand and Himachal Pradesh has compounded the scale of the disaster. There are of course links between climate change and extreme weather events as has happened with the torrential rain in Uttarakhand. But this has been exacerbated by the reckless construction of buildings, dams and roads in a fragile environment. Many of the settlements have been built right next to the rivers in blatant violation of environmental laws. The expansion of roads has proved a major destabilising factor combined as it is with plans to construct over 200 dams in this sensitive eco-zone. Data with the Uttarakhand state transport department bears this out. The state has seen a 1000......

Words: 2541 - Pages: 11

Premium Essay


...with any project team is a lack of good communication.This type issue could arrise where team members are scareterd all over the world without face to face communication.The communication through the internet, skype or some of the other communication technologies that are now available are sometimes not reliable and could cause miscommunication. what about one of the team members performing one of the tasks without informing the other team members about it. Overdetermining - project managers sometimes overstates their capabilities of comleting a project on time. That is when a project will take say two months to accomplish they use presure or lack of experience or presure to perform even the other factors that ignores reality for something that is not imporsimble to accomples in the time given. When everyone is not available at the same time to work as a team on the project this could cause a delay to finish and deliver the project on time. The trade offs that is to make a clear policy of communication from the begining of the project that nobody goes off course and that everyone have to work as a team and must be on the sameline with everyone on the team. The project head must make him or herself available at all time to make sure that all the policys are met by everyone in the group. Handster inc. 1. Which projects would you recommend Handstar pursue based on the NPV approach? The spreadsheet bellow summarizes the NPV calculations for the six projects......

Words: 518 - Pages: 3

Premium Essay


...The Project manager will put together a human resources team that will be responsible for building a cross-cultural team that will work closely together. Individuals who are bilingual and have worked on a global scale will be given priority. Employees will be selected through a thorough interview process that includes background checks and drug testing. We will only hire qualified individual because they will represent the Acme Company in Mexico and will help us establish a relationship with the community we will be serving An approach is to work with a reputable local employment agency, another one is to hire translators to assist management and local staff. The human resources team will implement current company policies and procedures A marketing and communication team will be responsible for: * promoting Acme products * Supporting project management in achieving the aims and objectives of the project. * Implementation and evolution of the brand guidelines. * Instilling and communicating good marketing and communications practice across Acme * Marketing analysis and environmental scanning (the team will ensure that Acme offers competitive prices than local competitors. * Helping the company communicate with the public. * Creating advertisements, campaigning, offering coupons In order to have an effective marketing strategy, we will work with local marketing companies because they have better understanding on how to market Acme’s......

Words: 319 - Pages: 2

Premium Essay


...State University of New York Empire State College, MBA Program Course 651644: Tools and Processes in Project Management Summer 2013 term Instructor: Dr. Adams Assignment #1: X-philes Data Management Corporation: RFP Matters By Jose M Collazo What is the basis for the problem? There are two primary problems with how X-philes Data Management Corporation handled the request for proposal. The first one was the lack of communication by the managers who selected the same vendor for two different projects. This problem led to the creation of the second problem which is proper resource allocation. When dealing with multiple projects with the same vendor, the company runs the risk of creating multiple interdependencies. Any resource allocation decisions made in one project by the vendor are likely to have ramifications in the other projects. According to Pinto, Some of the better known problems include inefficient use of resources, resource bottlenecks, ripple effects, and the heightened pressure on personnel to multitask (Pinto 2013). The personnel issue in particular, was a main cause of schedule slippage as employees quit at the contractor and they were unable to maintain sufficient staffing levels to keep the projects on track. While bottleneck’s restricts a vendor's ability to make money, they realize that the best way to maximize income is to fully exploit the bottleneck resource (Chakravorty & Atwater§, 2006)...

Words: 1044 - Pages: 5

Premium Essay


...PROJECT MANAGEMENT COURSE ASSESSMENT 1 The final date for submission of this assessment without penalty is 24th March 2014 Assessment will be accepted for marking 14 days prior to the due date Late Penalty System Please refer to the Student/Programme Handbook This module is being delivered through the Manchester Blackboard virtual learning environment. All assessments must be submitted through Blackboard at: If you have any technical difficulties using blackboard, please visit our support pages at: Submitting your Assignment 1. Assignments should be typed, 10 or 11 point font size (Times Roman or similar if possible) double spaced with a 4 cm margin on the right side of the page with the page size specified as UK A4. All pages must be numbered. 2. Assignments should be submitted in either Microsoft Office and/or PDF format (.doc, .docx, .pdf etc.). File names should be kept simple and only contain alphanumeric characters (a-z0-9), spaces and underscores (e.g. Valid_filename_1.doc). Files with other characters such as apostrophes, brackets or commas may not be accessible by markers. 3. Assignments may be uploaded only once; substitutions are not permitted and students should therefore ensure that the version uploaded is their final submission. 4. Please ensure you include your student number and the assignment reference (PM/Student Number/Jan14/1) in all submitted assignments and that......

Words: 740 - Pages: 3

Premium Essay


...International S.A.L & Various Projects accomplished                             Completes projects and special assignments by establishing objectives; determining priorities; managing time; gaining cooperation of others; monitoring progress; problem-solving; making adjustments to plans. Interpreting financial, operational, commercial or customer insights to ensure a trading issue is fully understood and that hard hitting actions are taken and constantly reviewed Developing, reviewing and optimizing trading strategies Work with the Sales & Pricing department to target specific ‘high value’ customers and drive the business passenger portfolio with to ensure the business maximizing revenue Manage internal relationships with shipping companies ensuring best shipping prices are obtained Thoroughly understand the fundamentals of marketing to drive plans to tactically promote the routes Build the right relationships in the destinations ports with the clearing agents to promote easy and smooth delivery Preparing spreadsheets and obtains details for price increases Assisting procurement, sales department with all their needs Finding the best suppliers , and grade them all among the approved supplier list Responsible for all the purchases Provides all factory needs Maintain Stock Maintaining regular contact with Suppliers. Maintaining comparison list of materials/new products with several suppliers. Assisting with new projects. Collecting and entering......

Words: 1265 - Pages: 6

Premium Essay


...NT1310 : Project Page 1 PROJECT DESCRIPTION As the project manager for the Cable Planning team, you will manage the creation of the cable plan for the new building that will be built, with construction set to begin in six weeks. The deliverables for the entire Cable Plan will consist of an Executive Summary, a PowerPoint Presentation and an Excel Spreadsheet. You will develop different parts of each of these in three parts. The final organization should contain these elements: The Executive Summary: o Project Introduction o Standa rds and Codes  Cable Standards and Codes  Building Standards and Codes o Project Materials o Copper Cable, Tools, and Test Equipment o Fiber - Optic Cable, Tools, and Test Equipment o Fiber - Optic Design Considerations o Basement Server Complex Design o First Floor Design o Security and Safety o Component Cost, Picture, and source The Excel Spreadsheet: Component Names Component Descriptions Component Costs Total Project Costs The PowerPoint Presentation: Introductory Slide Component Slides with Component Name, Quantity Needed, Description, Price, Picture, and Reference (where to buy the component) Description of the Basement Telecommunications and Network Server Space Network Equipment Required for the Server Farm Cable Plant Design for the Basement NT1310 : Project Page 2 Standard Floor Desig n for Computers and Network Equipment Cable Plant for the Standard Floor Course Objectives......

Words: 1510 - Pages: 7

Premium Essay


...Project Plan Outline 1.0 Goals and Objectives This section presents a general description of the project along with any general or technical constraints and/or considerations. Please include the sub-sections below. 1. Project name 2. Business goals and project goals 3. Scope 4. Time and budget constraints 5. General and technical requirements 6. Training and documentation 7. Installation 2.0 Project Estimates This section presents a set of estimates for the completion of the project, including people, hardware and software. Please include the following sub-sections. 1. People costs a. Historical or researched data used for estimates (Requires annotation listing where you got this information) b. Salary requirements 2. Equipment costs (Requires costs for all hardware and software used. It is assumed that all hardware and software will be new). a. Hardware b. Software 3. Estimation techniques and results a. Process-based (use the format shown in section 1.2.1 of the lecture) b. Second method c. Triangulation results 3.0 Project Schedule This section presents an overview of project tasks and the output of a project scheduling tool. The following sub-sections should be included: 3.1 Project task list The tasks that have been selected for the project are presented in this section. 3.2 Task network Project tasks and their dependencies are noted in this diagrammatic form. 3.3 Timeline chart A project timeline chart (Gantt chart) is......

Words: 508 - Pages: 3

Premium Essay

Project a Project Manager in their Washington DC offices. Provides program support to team members as needed related to projects and program activities. Tasks include task tracking, program change management support, administrative support and project and program reporting. Helps with the preparation of project and program schedules and coordinates the necessary internal and external resources to fulfill the project and program activities within the prescribed time frames and funding parameters to ensure project and program objectives and stakeholders expectations are met. Specific responsibilities include: * Coordinates activities within the project life-cycle including initiation, planning, execution, monitoring and control phases. * * Helps with the preparation of Project and Program Weekly Status report as necessary and upload to the Project Server in a timely fashion. * Generates various other Project, Program and department related status reports as needed. * Helps prepare responses for anticipated questions during the weekly ITIL meeting (in case of a Red project). * Helps Identify and schedules project deliverables, milestones, and required tasks. * Prepares change management documentation in support of the change management process and supports the Change Management meeting. * Documents all change management decisions according to the change management process * Coordinates selection and assignment of SMEs to the......

Words: 343 - Pages: 2

Premium Essay


...Strategy & Project Management: Project orientated organisations Finnland 2005 Prof. (FH) Peter J. Mirski Prof.(FH) Mag. Peter J. Mirski Tel.: +43-512-2070-3510 E-Mail: Current Position MCI, University of Applied Sciences: Director of studies „Management & IT“, Head of IT-Services Academical Profile Research projectmangement, knowledgemanagement strategic information management, e-learning Education process, project, information management Publications and articles in journals Practice Profile Management, R&D Project Management, CEO, CIO Consulting & Training Agenda 10:00 – 14:00 Brief project management overview Project orientated organisations Project scorecard Discussion Literature De Marco T., „The Deadline“, Dorset House Publishing Co ,1997 Goldratt E., “The Critical Chain“, North River Press, 1997 Heerkins G., „project management“, briefcase books 2002 PMBOK Guide, „A Guide to the Project Management Body of Knowledge“, PM Institute, 2000 Links • (pm baseline english, german) • (pm information) project management overview Importance of Project Management • Projects represent change and allow organizations to effectively introduce new products, new processes, new programs • Project management offers a means for dealing with dramatically reduced product cycle times • Projects are becoming globalised, making them more difficult to manage without a formal methodology –...

Words: 1737 - Pages: 7

Free Essay


...SECOND YEAR FINAL PROJECT COURSE CODE: 227 NAME: MUIGUA STEPHEN GITAU ADM NO: P15/54335/2012 SUPERVISOR: ERIC AYIENGA   DECLARATION I, Muigua Stephen Gitau, do declare that this project is my own work, and as per my knowledge, it has not been submitted to any other institution of higher learning. Student’s Name: MUIGUA STEPHEN GITAU Registration No: P15/54335/2012 Signature: _________________________________________________________ Date: _________________________________________________________ This project has been submitted as a partial fulfillment of requirements for the Diploma in Computer Science of the University of Nairobi with my approval as the University Supervisor. Supervisor’s Name: Mr. ERIC AYIENGA Signature: ___________________________________________________________ Date: _______________________________________________________________   ACKNWOLEDGEMENT I thank almighty God; I thank Nairobi University of Kenya in Conjunction with the School of Computing and Informatics for facilities and resources they availed during execution of this project. I take this opportunity to express my sincere appreciation to my supervisor Mr. Ayienga and the entire Faculty of Computer Science for the exemplary guidance, monitoring and constant encouragement throughout the course. Lastly, I thank my parents, for their constant support even as I worked over the night and throughout the week towards school and this......

Words: 4782 - Pages: 20

Premium Essay


...THE CONTRIBUTION OF PROJECT MANAGEMENT TO THE DEVELOPMENT OF GHANA INTRODUCTION Project management as a management discipline underpins much economic activity. In industries as diverse as pharmaceuticals, software and aerospace, projects drive business. And in the public sector, it is effective project management that translates politicians' promises of new roads, schools and hospitals into gleaming new constructions that improve everyday life. The development of Ghana Successive Ghanaian governments pursued various models of economic development throughout the 1960s, 70s and 80s. In the immediate post independent era of the early 1960s, Ghana’s economic development objectives were geared towards the ‘Big Push’ primary economic policies. These revolved around: a major investment effort; an industrialization drive; increased import substitution; processing of commodities and minerals previously exported in their raw form; and direct state participation in leading areas of the economy. The 1970s ushered in a policy of increased ‘Ghanaianisation’ or indigenisation with specified industrial activities reserved for state participation, Ghana-foreign ownership, and exclusive Ghana ownership, among others. The early 1980s saw the liberalization of the Ghanaian economy and the encouragement of foreign investments. All these approaches, however, fell far short of expectations and the failures were exacerbated by adverse terms of trade, falling commodity prices, and crippling debt......

Words: 1230 - Pages: 5

Premium Essay


...Project Kick-Off Meeting Dwayne A. Blanchette BUS 611: Project Planning and Management Dr.: Donald McKay April 25, 2016 Recently the project charter for transitioning the Quick Drop 100 (QD100) from New York to Florida received final authorization. I was awarded the project and assigned as project manager (PM) to lead a team of qualified individuals and complete the task of relocating the QD100 program to the state of Florida. The next step in the preparation phase is to hold a project kickoff meeting. This meeting will be used to acclimate team members, clients, and other attendants to ensure everyone understands the key players and their respective roles. As the PM I plan to generate enthusiasm, motivation, and excitement while maintaining a guided discussion regarding the content, schedule, and duration of the project from start to finish. To prepare for the meeting I will accomplish several preliminary tasks. The most important areas to consider during preparation include identifying stakeholders, communication methods, team building, accountability and code of conduct. Once the tone has been set and key points discussed the meeting will conclude by first reiterating member expectations and responsibilities followed by a summary of all pertinent information. The bottom line is this kickoff meeting will be presented as such to ensure all relevant attendants and stakeholders are provided a transparent achievable list of goals. Stakeholders A......

Words: 1862 - Pages: 8