Professional Documents
Culture Documents
Project Management: Case Analysis-Trans LAN Project
Project Management: Case Analysis-Trans LAN Project
Project Management
Trans Systems is a small information systems consulting firm located in Meridian, Louisiana.
Trans has just been hired to design and install a local area network (LAN) for the city of
Meridian's social welfare agency. You are the manager for the project, which includes one
Trans professional and two interns from a local university. You have just finished a
preliminary scope statement for the project (which follows). You are now brainstorming
potential risks associated with the project.
PROJECT OBJECTIVE
To design and install a new local area network (LAN) within one month with a budget not to
exceed $125,000 for the Meridian Social Service Agency with minimum disruption to
ongoing operations.
DELIVERABLES
MILESTONES
TECHNICAL REQUIREMENTS
1. On-site work to be done after 8:00 p.m. and before 7:00 a.m. Monday through
Saturday.
2. System maintenance and repair only up to one month after final inspection.
3. Warranties transferred to client.
4. Only responsible for installing software designated by the client two weeks before the
start of the project.
5. Client will be billed for additional training beyond that prescribed in the contract.
ACCEPTANCE CRITERIA
1. Identify potential risks associated with this project. Try to come up with at least five
different risks.
Team size: the workload is too big compared to the size of the team and the
timeline
Budget: The realibility of the estimates, what if the expense overstep the budget.
(the budget seems to small)
Security: Need ty be tested (The system) many times to ensure that only
authorized users can get access
User priorities: the users may not be able to use internet, during the transitioning
to new LAN.
Availability of hardware and software:Shortages of hardware and software is a big
problem
2. Use a risk assessment form to analyze identified risks.
Budget 4 5 2 Continuous
Availability of 3 4 3 Installation
Hardware and
Software
Security 4 4 4 Post
Installation
Now we know what are the risks associated with this project and we have also completed
risk assessment for those risks. Now we will make risk response matrix to deal with all
the risks.
risk response matrix is designed and used to ensure that a company, project or person is
properly prepared to manage and respond to these risks in an effective manner.
Risk response matrix contains risk event, response, contingency plan, trigger and person
responsible. Every risk event will have response, contingency plan, trigger and person
responsible.
Response is a decision which we think is appropriate for the specific risk event. There are
5 types of responses mitigating, avoiding, transferring, escalating, and retaining.
Contingency plan is an alternative plan that will be used if a possible risk event becomes
a reality.
Trigger is a condition of implementing the contingency plan.
Person responsible is a person who will monitor the potential risk and will initiate the
contingency plan assigned to the risk.
Now for our first risk event,
Team size: as we know our team size is very low so to avoid that risk our response will
be to add more members to our team. For our contingency plan we can hire more workers
on a contract base or we can outsource them. Work load of the team will trigger the
contingency plan and people responsible for this will be project manager and Meridian's
social welfare agency.
Budget: To decrease the budget problem in response we can try to increase the budget, so
in contingency plan we need to negotiate with Meridian's social welfare agency for the
budget. Contingency plan will be triggered when there will be insufficient funds for
continuing the project. project manager will be person responsible.
Availability of Hardware and Software: To avoid this risk we need to get in contact
with different suppliers. Our contingency plan will be to Follow up on ordering extra SW
and HW. Shortages would be identified from the onset of the LAN and that will be
Trigger point for this risk. Project manager is person responsible for this event.
Security: System test and security check is response for this risk, and contingency plan
will be finding Alternative way for the member to secure the system. When there is some
problem in the system or system is not working properly that can work as trigger. Person
responsible for this will be Trans professional.
User Priority: In response to this we need to Have a system on standby during the
transition of new LAN. For our contingency plan we need to use secondary server. If
some instability or glitches are shown in the system while transitioning to new LAN we
will take this as a trigger. Trans professional will be person responsible for this risk event.