Download as pdf or txt
Download as pdf or txt
You are on page 1of 49

Pearson

Higher Nationals in
Computing
Unit 6: Managing a Successful Computing
Project

JALINA WICKRAMARACHCHI MSCP 5 1


Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC HND in Computing

Assessor Internal Verifier


Unit 06: Managing a Successful Computing Project
Unit(s)
Managing a Project on cyber security risks due to Remote working
Assignment title
Jalina Prabashwara Wickramarachchi / E127390
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature

JALINA WICKRAMARACHCHI MSCP 5 2


Programme Leader
Date
signature (if required)

JALINA WICKRAMARACHCHI MSCP 5 3


Higher Nationals – Summative Assignment Feedback Form
Student Name/ID Jalina Prabashwara Wickramarachchi / E127390
Unit Title Unit 6 Managing a Successful Computing Project

Assignment Number 1 Assessor


August 25, 2022 DateReceived1stsub
Submission Date
mission
DateReceived2ndsubmissio
Re-submission Date
n
Assessor Feedback:

LO1.Establish project aims, objectives and time frames based on the chosen theme

Pass, Merit & Distinction P1 P2 P3 M1


Descripts
LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

to support the project

Pass, Merit & Distinction P4 M2 D1


Descripts

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place
and grades decisions have been agreed at the assessment board.

JALINA WICKRAMARACHCHI MSCP 5 4


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

JALINA WICKRAMARACHCHI MSCP 5 5


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become detached
for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You
will then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could
be reduced to A REFERRAL or at worst you could be expelled from the course

JALINA WICKRAMARACHCHI MSCP 5 6


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct way. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Pearson UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspects of my program, will be
my own, and where I have made use of another’s work, I will attribute the source in the
correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the attached.

jalinawickrama@gmail.com 25th August 2022


Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

JALINA WICKRAMARACHCHI MSCP 5 7


Higher National Diploma in Computing

Assignment Brief
Student Name /ID Number Jalina Prabashwara Wickramarachchi / E127390

Unit Number and Title Unit 6: Managing a Successful Computing Project

Academic Year 2021/20222018

Unit Tutor Mr. Geeth Weerasinghe

Assignment Title Vulnerability Assessment - Management Information


System Project

Issue Date 23rd March 2022

Submission Date 25th August 2022

IV Name & Date

Submission Format:

The submission should be in the form of an individual report written in a concise,


formal business style using single spacing (refer to the assignment guidelines for more
details). You are required to make use of headings, paragraphs, and subsections as
appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please provide in-text citation and a list of references
using Harvard referencing system.

Please note that this is an individual assessment and your report should include
evidences to that you have conducted a research to collect relevant data individually.

JALINA WICKRAMARACHCHI MSCP 5 8


Unit Learning Outcomes:

LO1 Establish project aims, objectives and timeframes based on the chosen theme.

LO2 Conduct small-scale research, information gathering and data collection to


generate knowledge to support the project.

LO3 Present the project and communicate appropriate recommendations based on


meaningful conclusions drawn from the evidence findings and/or analysis.

LO4 Reflect on the value gained from conducting the project and its usefulness to
support sustainable organizational performance.

JALINA WICKRAMARACHCHI MSCP 5 9


Assignment Brief and Guidance:

Research Theme: Remote working

Research Topic: What are the key cyber security risks of working remotely e.g.
employees downloading unsecure apps or sharing their work devices with family
members?

“The option to work remotely was already being embraced by some businesses in the
pre-pandemic era. These businesses were making some progress to adapt their working
practices to accommodate remote working by allowing those in certain job roles to take
the opportunity to work from home, albeit a day or two a week. However, on the whole
there had been a reluctance to have staff working remotely and this has largely centred
around productivity concerns, security implications and technology issues.

The global pandemic however necessitated and accelerated the move to remote working.
The vast majority of businesses have now shifted some or all of their operations online,
and almost all of their staff are working from home. The enabling force behind this
necessary shift has been the different technologies and platforms that facilitate workers
to achieve business goals remotely. This sudden shift to remote working took place
within weeks and months and has not been without issues. Several surveys conducted
during this period cited business leaders complaining about how technology problems
have impacted their business and employees while working remotely. The biggest issues
remote workers face are being frequently disconnected from corporate networks, slow
file downloads, poor quality of video meetings and long response times when loading
apps. As a result, building secure, effective and integrated technology capability, to
continue this flexibility in the workforce, has now become a priority for all
organisations”. (Pearson, 2020)

You are expected to carry out a small-scale research in order to explore the cyber
security risks of working remotely due to the pandemic, from the standpoint of a
computing professional. The research that you carry out can be based on an
organization that you have access to gather sufficient information to investigate the
cyber security risks of remote working.

JALINA WICKRAMARACHCHI MSCP 5 10


The report should include,

• A comprehensive project management plan


• Evaluation of data collection methods and data analysis tools and/or techniques
should be provided
• Appropriate recommendations should be provided
• Reflect on the value gained from conducting the project and its usefulness to
support sustainable organisational performance

TASK – 01
1.1 Define the scope of the project and devise aims and objectives of the project that
you are going to carry out. You also should include a brief introduction to the
selected company, remote working process and technologies used, explanation
to the project and other relevant information about the research.

1.2 Produce a comprehensive project plan including the following.


• Cost, scope, time, quality, communication, risk, and resources management
plan
• Comprehensive Work Breakdown Structure (WBS) with clearly defined
activities and milestones
• Gannt chart to illustrate project schedule with realistic time allocated for each
activity and clearly defined deadlines for milestones.

TASK – 02
Carry out a research to investigate the cyber security risks of remote working by
applying appropriate qualitative and quantitative research methodologies and critically
evaluate the reliability, accuracy and the appropriateness of the research methods
applied. your answer also should include a critical evaluation of the project
management process and a justification to the selected research methodologies.

TASK – 03

JALINA WICKRAMARACHCHI MSCP 5 11


3.1 Analyse research data collected to support your research project using appropriate
tools, techniques and critically evaluate how selected tools, techniques uphold
authenticity and the accuracy of the data collected.
3.2 Draw valid conclusions and recommendations from the research data analysed and
communicate your recommendations to the top management of the organization
through an action plan. The action plan should include a justification to the
recommendations suggested.

TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own
learning experience gained through following a quality research and the project
management process. Critically evaluate the ways in which the research project
carried out supports the organization to sustain its performance/ security in a
remote working environment and how the project supported you to improve your
own learning and performance.

JALINA WICKRAMARACHCHI MSCP 5 12


Acknowledgement

I’d like to offer my best regards to Mr. Geeth Weerasinghe to succeed the semester and the
security module and as well as Mr. Anjana and the other staff members of the Esoft metro
campus and the management those who had contributed.

JALINA WICKRAMARACHCHI MSCP 5 13


Table of Contents
ACKNOWLEDGEMENT .................................................................................................................................... 13
ACTIVITY 1 ............................................................................................................................................. 16
RESEARCH FOR CYBER SECURITY RISKS IN REMOTE WORKING ................................................................................ 16
RESEARCH AIMS & OBJECTIVES ....................................................................................................................... 17
Aims..................................................................................................................................................... 17
Objectives ............................................................................................................................................ 17
COST MANAGEMENT ..................................................................................................................................... 17
SCOPE OF THE RESEARCH ................................................................................................................................ 18
TIME MANAGEMENT ...................................................................................................................................... 18
QUALITY MANAGEMENT ................................................................................................................................. 18
COMMUNICATION PLAN ................................................................................................................................. 18
RISK MANAGEMENT ....................................................................................................................................... 19
RESOURCES MANAGEMENT ............................................................................................................................. 19
GANTT CHART .............................................................................................................................................. 20
WBS STRUCTURE (WORK BREAKDOWN STRUCTURE) ........................................................................................... 21
ACTIVITY 2 ............................................................................................................................................. 22
RESEARCH METHODS ..................................................................................................................................... 22
QUANTITATIVE RESEARCH ............................................................................................................................... 23
QUANTITATIVE RESEARCH METHODS ................................................................................................................. 23
1. Survey ........................................................................................................................................ 23
2. Experiment ................................................................................................................................. 23
3. Observation ............................................................................................................................... 23
4. Secondary research .................................................................................................................... 23
QUALITATIVE RESEARCH ................................................................................................................................. 24
QUALITATIVE RESEARCH METHODS ................................................................................................................... 24
1. One to one interview.................................................................................................................. 24
2. Focus Groups ............................................................................................................................. 24
3. Case study research ................................................................................................................... 24
4. Ethnographic research ............................................................................................................... 25
PROJECT MANAGEMENT PROCESS ..................................................................................................................... 25
Project Initiation .................................................................................................................................. 25
Project Planning .................................................................................................................................. 26
Execution ............................................................................................................................................. 27
Project Monitor and Control................................................................................................................ 27
Project Closure .................................................................................................................................... 27
ACTIVITY 3 ............................................................................................................................................. 28
3.1 ANALYZE RESEARCH DATA USING APPROPRIATE TOOLS AND TECHNIQUES ............................................................ 28
DATA ANALYZING METHODS ............................................................................................................................ 28
Brainstorming...................................................................................................................................... 28
Delphi technique.................................................................................................................................. 29
Fishbone technique ............................................................................................................................. 29
QUALITATIVE RESEARCH DATA ANALYSIS TOOLS ................................................................................................... 29
3.2 ANALYZED DATA FROM GOOGLE FORMS ....................................................................................................... 30
RESPONSES FOR THE ABOVE SURVEY.................................................................................................................. 35
1. Position at the Company ............................................................................................................ 35
2. Remote working experience ...................................................................................................... 35
3. Sectors you have worked ........................................................................................................... 36
4. Are you hacked or phished by someone while working? ........................................................... 36
5. Are you aware about hackers or data thieves and reactions against them?............................. 36
6. How about your Internet connection speed by ookla ................................................................ 37
7. Are you facing device slow speed issues or crashing while working that or any other issue with
device annoying to work?.................................................................................................................... 37

JALINA WICKRAMARACHCHI MSCP 5 14


8. Process to connect company VPN or server ............................................................................... 37
9. Do you facing problems while using or downloading softwires that needed? .......................... 38
10. Using antivirus softwires and firewalls for working pc ......................................................... 38
11. Looking long time to take it support ..................................................................................... 38
12. Other security issue (please state here) ................................................................................ 39
13. Looking forward to get ware about solutions for minimize those risks ................................ 39
CYBER CIRCUITY AWARENESS PERCENTAGE IN VARIOUS COUNTRIES.......................................................................... 39
ACTIVITY 4 ............................................................................................................................................. 40
REFLECT ON THE VALUE OF UNDERTAKING THE RESEARCH TO MEET STATED OBJECTIVES AND OWN LEARNING AND
PERFORMANCE. ............................................................................................................................................ 40
CRITICALLY EVALUATE THE PROJECT MANAGEMENT PROCESS AND APPROPRIATE RESEARCH METHODOLOGIES APPLIED. ...... 41
Google Forms for data gathering ........................................................................................................ 41
CONCLUSION OF THE RESEARCH ....................................................................................................................... 45

Table of Figures
FIGURE 1GANTT CHART ...................................................................................................................................... 20
FIGURE 2INSTERGANTT TOOL ............................................................................................................................... 21
FIGURE 3WBS STRUCTURE .................................................................................................................................. 22
FIGURE 4MINMAP FOR BRAINSTORMING STEPS FOR RESEARCH .................................................................................... 28
FIGURE 5BEST 12 TOOLS TO ANALYZE DATA............................................................................................................. 30
FIGURE 6FORM IMAGE 1 ..................................................................................................................................... 31
FIGURE 7FORM IMAGE 2 ..................................................................................................................................... 32
FIGURE 8FORM IMAGE 3 ..................................................................................................................................... 33
FIGURE 9FORM IMAGE 4 ..................................................................................................................................... 34
FIGURE 10Q1 ................................................................................................................................................... 35
FIGURE 11Q2 ................................................................................................................................................... 35
FIGURE 12Q3 ................................................................................................................................................... 36
FIGURE 13Q4 ................................................................................................................................................... 36
FIGURE 14Q5 ................................................................................................................................................... 36
FIGURE 15Q6 ................................................................................................................................................... 37
FIGURE 16Q7 ................................................................................................................................................... 37
FIGURE 17Q8 ................................................................................................................................................... 37
FIGURE 18Q9 ................................................................................................................................................... 38
FIGURE 19Q10 ................................................................................................................................................. 38
FIGURE 20Q11 ................................................................................................................................................. 38
FIGURE 21Q12 ................................................................................................................................................. 39
FIGURE 22Q13 ................................................................................................................................................. 39
FIGURE 29CYBER SECURITY AWARENESS ................................................................................................................. 39
FIGURE 23RESPONSE 1 ....................................................................................................................................... 41
FIGURE 24RESPONSE ......................................................................................................................................... 42
FIGURE 25RESPONSE 3 ....................................................................................................................................... 43
FIGURE 26RESPONSE 4 ....................................................................................................................................... 44
FIGURE 27SPREAD SHEET 1 ................................................................................................................................. 44
FIGURE 28SPREAD SHEET 2 ................................................................................................................................. 45

Table of Tables
TABLE 1COST PLAN ............................................................................................................................................ 17
TABLE 2RESOURCE ALLOCATION ........................................................................................................................... 19
TABLE 3ADVANTAGES AND DISADVANTAGES ........................................................................................................... 23

JALINA WICKRAMARACHCHI MSCP 5 15


Activity 1

Research for Cyber Security Risks in Remote Working

At present a large number of companies shifted for remote working environment due to
the pandemic situation that was affected in previous two years. Some of were already
provide remote working for selected positions but at present that has been offered for
most of the roles in the company. So those all employees are working from there devises
through online with internet connections. Usually there must be cyber security risks while
they are working.

This research project done with a digital marketing-based agency founded in 2021/02
called Assist who have their operations doing from remote with worldwide employees
and their headquarters is hosted in UK. Mainly they are using their website to handle
orders and clients, using slack and asana to project management, Trello software to time
tracing, Zoom or MS Teams to host meetings. I’d like to offer my regards to the Founder
& CEO of Assist Mr. Carmichael and for the employees supported.

There were 9 employees from UK, Russia, Malesia and India region. There were
marketing executes, project manager, web developers and designers. So, my research to
find key cyber security risks to remote employees in Assist.

JALINA WICKRAMARACHCHI MSCP 5 16


Research Aims & Objectives

Aims
Aims are that what are the expectations of a certain project. So, their ware expectations and
goals of this as well.
• Mainly identify cyber security risks for a remote working company.
• Track solutions for those major issues.
• Take idea about remote agencies operations and management system.
• Contact industry professionals

Objectives
Objectives are that achieve from the specific project.
• Risk mining and drive to success of the project
• Analyze collected information correctly
• Create a meaningful research documentation

Cost Management

The cost of doing this study is dependent on a number of variables, including the research's
scope, methodology, data gathering techniques, project procurement, and other incidental
duties. It is essential to consider each of these elements when allocating the money. Sticking
to the project's scope and completing all tasks by the deadlines set forth are essential for
improved cost management.

Table 1Cost plan

No Item Qty Unit Cost Total


1 Internet & Wi-Fi (take as individual) 50GB 30 1500
2 Electricity bills 100 30 3000
3 Printing Costs 20 10 200
4 Data gathering software plans 1 5500 5500
5 Cloud hosting and drive plans 10GB 200 2000

JALINA WICKRAMARACHCHI MSCP 5 17


Total Amount 12, 200

Scope of the Research

The process of deciding, identifying, and regulating the outputs, results, and advantages is
known as scope management. In project management, the phrase "scope" is used to
describe the whole of the results, merits, and labor required to achieve them. Benefits and
outputs of items as well as a firm are discovered in order to improve the overall effect of
globalization at this stage. The range of options for an employee is broad with the new job
opportunity duties and responsibilities. Stakeholders will pose some questions concerning
the business's foreign growth in a main research that will be undertaken.

Time management

A time frame is good to have monitor the research status and the compilation rate in order
to conduct in an efficient way. Mainly for the employees needs a proper time management
because they are in a heavy schedule. So that to succeed the project that needed a good time
management plan.

Quality management

Both quantitative and qualitative research are conducted, and only high-quality findings
from the comparison of quantitative and qualitative data are included in the study. The
individual researcher must have to identify goals and need to drive project to achieve those
goals.

Communication plan

The project management plan aids in improving both formal and informal communication
to enhance international commerce. Communication is a critical component in achieving

JALINA WICKRAMARACHCHI MSCP 5 18


research objectives and goals. As a result, effective communication between the various
departments within the workforce must be established at the agency.

Risk management

It is vital to accomplish this in order to conduct fruitful research and to reduce the risks
related to the project management plan. Risk might be taken while working with an
organization. It results in cultural barriers and an increase in project conflicts of interest.

Resources management

Risk management is the process of recognizing, assessing, and containing hazards to a


Research and project compilation. These dangers or hazards may arise from a number of
different things, such as monetary risk, legal obligations, strategic management mistakes,
mishaps, and natural calamities.

Table 2Resource allocation

No Resources assumption
1 Budget 12, 200 required
2 Tools Google forms
MS office
Questionnaires and forms
Newsletters, notices, shareable posts, Emails and outlook
Project quality management tools/ metrics
Project audit
3 Plans and Gantt chart
Documents WBS structure and communication plan
Project scope
Risk management plan and alternatives
4 Interviewing Founder & CEO of the company / owner
positions Project mangers
Designers and developers
Marketing executives

JALINA WICKRAMARACHCHI MSCP 5 19


Gantt Chart

This is one of the most well-liked and straightforward methods for displaying a table of
events and activities, together with the start date, time, and finish date of each activity. The
Gantt chart is used in project planning and management. Gantt charts are used in project
management to plan and schedule work. A Gantt chart is very useful since it enables you
to break down large projects into an understandable timetable and monitor job progress.

Figure 1Gantt chart

That used a tool called instergantt to create this Gantt chat. It’s a fully online and cloud-
based tool that helped to share charts with the agency employees as well.

JALINA WICKRAMARACHCHI MSCP 5 20


Figure 2instergantt tool

WBS structure (Work Breakdown Structure)

A Work Breakdown Structure (WBS) is a hierarchical breakdown of the tasks that must be
completed by the project team in order to meet the project's objectives and produce the
necessary deliverables. The foundation for effective project planning, execution, control,
monitoring, and reporting is a WBS. Separating and designing those project components in
advance will allow them to more effectively manage and employ certain components,
which will boost the project's efficacy. It also integrates size, pricing, and schedule to make
planning and projecting jobs simpler, even when establishing a project to create objectives.

JALINA WICKRAMARACHCHI MSCP 5 21


Figure 3WBS structure

Activity 2

Research Methods

A systematic investigation to analyze, explain, forecast, and manage the observed


phenomena is known as research. Deductive and inductive approaches are used in research.
Research uses both inductive and deductive methodologies. Inductive research techniques
are used to evaluate a witnessed event. Various research techniques exist.

JALINA WICKRAMARACHCHI MSCP 5 22


Quantitative research
Quantitative methods are used to concentrate on objective measurements and statistical,
mathematical, or numerical analysis of data obtained via surveys, questionnaires, and
surveys, as well as from the manipulation of statistical data that has already been acquired
using computing techniques. The primary goal of quantitative research is to collect and
generalize numerical data across populations or to explain a particular occurrence.

Quantitative research methods

1. Survey
A survey is a research method used for collecting data from a predefined group of
respondents to gain information and insights into various topics of interest. They
can have multiple purposes, and researchers can conduct it in many ways depending
on the methodology chosen and the study’s goal. In the year 2020, research is of
extreme importance, and hence it’s essential for us to understand the benefits of
social research for a target population using the right survey tool. (Anon., 2022)

2. Experiment
Doing test cases to control and manipulate a independent variable and take its
effects on the dependent variable.

3. Observation
Collect technique that participations response and phenomena while the test in
natural settings.

4. Secondary research
Mainly collect data from another research that has done previously.

Table 3Advantages and disadvantages

Advantages Disadvantages
Can test False focus
Large amount of data can be processed Destroy structural biases can still affect
using reliable and consistent procedures quantitative research.
through quantitative data analysis.

JALINA WICKRAMARACHCHI MSCP 5 23


Replicated due to structured protocols of Use restrictive operational definitions may
data collection and tangible meanings of inadequately.
abstract concepts.

Qualitative research

In order to comprehend ideas, viewpoints, or experiences, qualitative research gathers and


examines non-numerical data (e.g., text, video, or audio). It may be used to generate
original research ideas or to acquire comprehensive insights into a problem. This research
approach does not use statistics. The questions used to test the test and the researchers'
expertise are significantly weighted in qualitative research. Open-ended inquiries are posed
in such a manner that one inquiry naturally leads to another. Open-ended questions are used
to get as much information from the sample as feasible.

Qualitative research methods

1. One to one interview


As the name implies, this interview technique involves methodical planning and is
used with a single individual at a certain time. When doing one-on-one interviews,
a researcher must plan their questions in advance and make sure they are limited to
the most important ones.

2. Focus Groups
Focus groups are intimate gatherings of fewer workers who are often subject-matter
experts. The moderator's background in leading focus groups is crucial.

3. Case study research


Even purely quantitative academics may be able to connect to the significance of
the case study, which was made famous by the Harvard Business School, in
understanding an organization, entity, firm, or event. Understanding several data
sources in-depth is necessary for a case study.

JALINA WICKRAMARACHCHI MSCP 5 24


4. Ethnographic research
Ethnographic research is likely the qualitative approach that UX experts are most
acquainted with and able to use. In order to comprehend the goals, cultures,
difficulties, motives, and themes that emerge, ethnography requires you to fully
immerse yourself in the surroundings of the target participants.

Project management process

The project management method is a style of management that organizes and monitors
programs or projects. This process will proceed with the client's agreement and should be
supported by a contract that focuses on the overall needs and the project's ultimate
management. Project management, according to PMI, is the application of knowledge,
skill, resources, and strategies to a broad range of activities in order to fulfill the criteria of
a specific project. The management process has five steps.

1. Project Initiation
2. Project planning
3. Project Execution
4. Project Monitor and control
5. Project closure

Figure 4Project planning stages

Project Initiation

The project is beginning, and at the most fundamental level, this phase aims to define the
project. Typically, an enterprise situation is where this process starts. You will evaluate the
strategy's viability and realism in this instance. The goal of the study project is to determine
if work on feasibility needs to be done.

JALINA WICKRAMARACHCHI MSCP 5 25


First meeting with CEO

This is the initial stage of the project. For the permeation and interview I needed to attend
a MS teams meeting with them.

Figure 5Teams meeting

Project Planning

Once the project has been accepted, the following stage is to put together a project team
and start making plans for the timely and cost-effective management of the project. The
project plan will include the materials, finance, and resource requirements. The strategy
provides your team with guidance and the following,

• Cost
• Scope
• Risk
• Schedule

JALINA WICKRAMARACHCHI MSCP 5 26


• Time

Execution

Deliverables are created and finished at this stage. If a lot occurs within this period, such
as status updates, meetings, success announcements, and evaluations of outcomes.

Project Monitor and Control

All of this entails keeping an eye on the project's success and development while making
sure that everything follows the project management strategy. To make sure that the project
is planned, PMs will need to make changes to plans and services within this time cycle.
To make sure that the project plan is updated, every part of the project must be monitored
and adjusted as necessary. Observe the steps in this regard,

• Scope
• Cost
• Risk
• Quality
• Schedule

Project Closure

This procedure is mirrored. Job terminations are increasingly occurring for direct project
jobs. It is crucial to keep in mind key team members. Some PMs also organize modest
employment parties for those who have contributed to the project as a way of saying thank
you for their work. Additional interviews and questionnaires are observational interviewing
techniques; a questionnaire gives you time to think about your answers and the chance to
recall earlier events and emotions. The statistical technique allows for the speedy retrieval
of a huge number of responses, as well as their quick evaluation and generation in more
useful ways.

JALINA WICKRAMARACHCHI MSCP 5 27


Activity 3

3.1 Analyze research data using appropriate tools and techniques

Data analyzing methods

The systematic application of statistical and logical techniques to describe the data scope,
modularize the data structure, condense the data representation, illustrate via images, tables,
and graphs, and evaluate statistical inclinations, probability data, and derive meaningful
conclusions known as Data Analysis. These analytical procedures enable us to induce the
underlying inference from data by eliminating the unnecessary chaos created by its rest.
Data generation is a continual process; this makes data analysis a continuous, iterative
process where the collection and performing data analysis simultaneously. Ensuring data
integrity is one of the essential components of data analysis. (kaur, 2022)

Brainstorming

In addition to brainstorming, lateral thinking problems are solved in a relaxed,


informal manner. It helps folks to produce ideas and thoughts may appear a bit
strange at first. Some of these may be developed to come up with creative solutions
to problems, while others can foster creativity even more. It assists in releasing
individuals from their mental ruts by shocking them away from them.

Figure 6minmap for brainstorming steps for research

JALINA WICKRAMARACHCHI MSCP 5 28


Delphi technique

The Delphi method is an approach to predicting that is based on the results of many
rounds of questionnaires sent to a panel of experts. Multiple rounds of
questionnaires are distributed to the group of experts, and after each round, the
anonymous responses are compiled and shared with the group. In other terms, the
Delphi process is a collection of opinions on a certain topic that are often written
down and obtained via questionnaires sent to various subject-matter experts.

Fishbone technique

A fishbone diagram, a cause-and-effect diagram that enables managers to identify


the root causes of problems, or an Ishikawa defect diagram are some examples of
defect diagrams. The picture seems to be the root of the back issue and the body of
a fish with a problem on its head. Because all of the sources of the issue have been
recognized, administrators can also figure out how to prevent recurrence.

Qualitative research data analysis tools

At present there are various data visualization tools and softwires that can be use to analyze
gathered data in high quality. Here some of them,

• Google Forms
• HubSpost
• Maxqda
• Quirkos
• Qualtrics
• Qda Miner

JALINA WICKRAMARACHCHI MSCP 5 29


Figure 7best 12 tools to analyze data

3.2 Analyzed data from google forms

Google forms is a free tool that offers by google to conduct surveys and analyzed gathered
data in proper manner. I’ve selected as the main data collection and questionnaire creating
tool as google forms. That would be easy to answer following questions and gather answers.

Here’re the main questionnaire that I have created for this research and questionnaire,

1. Position at the Company


2. Remote working experience
3. Sectors you have worked
4. Are you hacked or phished by someone while working?
5. Are you aware about hackers or data thieves and reactions against them?
6. How about your Internet connection speed by ookla
7. Are you facing device slow speed issues or crashing while working that or any other
issue with device annoying to work?
8. Process to connect company VPN or server
9. Do you facing problems while using or downloading softwires that needed?
10. Using antivirus softwires and firewalls for working pc
11. Looking long time to take it support

JALINA WICKRAMARACHCHI MSCP 5 30


12. Other security issue (please state here)
13. Looking forward to get ware about solutions for minimize those risks

Figure 8form image 1

JALINA WICKRAMARACHCHI MSCP 5 31


Figure 9form image 2

JALINA WICKRAMARACHCHI MSCP 5 32


Figure 10form image 3

JALINA WICKRAMARACHCHI MSCP 5 33


Figure 11form image 4

JALINA WICKRAMARACHCHI MSCP 5 34


Responses for the above survey

For the above survey that there were 8 responses from the employees. There were 9 workers
at the company. There are from various countries in the world such as UK, Malaysia, Russia
and India working in marketing, software engineering and management fields.

Here’re the responses for one by one questions.

1. Position at the Company

Figure 12Q1

2. Remote working experience

Figure 13Q2

JALINA WICKRAMARACHCHI MSCP 5 35


3. Sectors you have worked

Figure 14Q3

4. Are you hacked or phished by someone while working?

Figure 15Q4

5. Are you aware about hackers or data thieves and reactions against them?

Figure 16Q5

JALINA WICKRAMARACHCHI MSCP 5 36


6. How about your Internet connection speed by ookla

Figure 17Q6

7. Are you facing device slow speed issues or crashing while working that or any
other issue with device annoying to work?

Figure 18Q7

8. Process to connect company VPN or server

Figure 19Q8

JALINA WICKRAMARACHCHI MSCP 5 37


9. Do you facing problems while using or downloading softwires that needed?

Figure 20Q9

10. Using antivirus softwires and firewalls for working pc

Figure 21Q10

11. Looking long time to take it support

Figure 22Q11

JALINA WICKRAMARACHCHI MSCP 5 38


12. Other security issue (please state here)

Figure 23Q12

13. Looking forward to get ware about solutions for minimize those risks

Figure 24Q13

Cyber circuity awareness percentage in various countries

Figure 25Cyber security awareness

JALINA WICKRAMARACHCHI MSCP 5 39


Activity 4

Reflect on the value of undertaking the research to meet stated objectives and
own learning and performance.

Basically, this research conduct to identify key cyber security risks for remote working
employees. So, for that selected a UK based start-up to gather information about remote
working errors. That needed a questioners and various interview processes for data
gathering and used google forms to data visualization.

It. Was great project to learn tie management and on time working with employees. I’ve
used Gantt charts, WBS structures to effective time management. Mainly working with
employees in a company they are in a packed schedule so we need to plan a quick method
to interview them and collect data. This research helps me to upgrade my time management
skills.

There was a limited budget assigned, So I needed manage it without exceeding the assign
amount. If cost run out then in case that would be limit the research altogether. I had to
create a cost management plan for it. The money and effort would be destroying if forfeited
and written off it that were to happen. Finally, that would be spent according to the plan
that I have created, so it has been spent meaningfully.

The outcome of this project must fulfil the objectives for which it was intended. Previously,
it was believed that the department of quality control was in charge of ensuring quality. In
recent years, the concept of total quality control has gained popularity, with all workers,
from top leadership on down, sharing responsibility for quality.

Planned progress must be at least as fast as actual progress. To ensure that the process is
completed on time or earlier, all important parts must occur by the dates stated for each of
their occurrences. The time frame objective is crucial since it is unlikely that the project
research reader would be pleased with a project's late completion.

JALINA WICKRAMARACHCHI MSCP 5 40


Critically evaluate the project management process and appropriate research
methodologies applied.

Google Forms for data gathering

I have selected main method as google form questionnaire because it’s easy to supply
answers for employees and as well as visualization process. From 9 employees that 8
employees were supported with the questionnaire. There were 13 questions about major
cyber security risks.

Here are the responses for the above google form.

Figure 26Response 1

JALINA WICKRAMARACHCHI MSCP 5 41


Figure 27Response

JALINA WICKRAMARACHCHI MSCP 5 42


Figure 28Response 3

JALINA WICKRAMARACHCHI MSCP 5 43


Figure 29Response 4

Here is the spread sheet created using collected data. It’s easy to identify results together
all responses.

Figure 30Spread sheet 1

JALINA WICKRAMARACHCHI MSCP 5 44


Figure 31Spread sheet 2

Conclusion of the Research

According to this research that there is a major Problem with lack of awareness about digital
technology and actions that can be taken at a certain error. As per the result large percentage
of workers are not aware about laws and regulations can take in situation like hacking or
data theft. Some of workers are not have proper devices for specific roles and internet
connections.

There can be errors with their servers and inner management system as well. That can be
initialize at certain points in those responses. So that wants be update those systems as well.
Most of the workers likes to educate about awareness and quick fixes for a such errors.

Google form link - https://forms.gle/dkAmDDpt8RMKSk3s8

Spread sheet link -


https://docs.google.com/spreadsheets/d/1Q8MuegVNjh6pCfcOvBny4gUY-
Y4bQRLO-luVuylgz1Y/edit?usp=sharing

JALINA WICKRAMARACHCHI MSCP 5 45


Bibliography
Anon., 2022. questionpro. [Online]
Available at:
https://www.questionpro.com/blog/surveys/#:~:text=A%20survey%20is%20a%20researc
h,chosen%20and%20the%20study's%20goal.
[Accessed 22 08 2022].
kaur, S., 2022. hackr.io. [Online]
Available at: https://hackr.io/blog/what-is-data-analysis-methods-techniques-tools
[Accessed 24 08 2022].

JALINA WICKRAMARACHCHI MSCP 5 46


Grading Rubric
Grading Criteria Achieved Feedback

LO1 Establish project aims, objectives and timeframes based on the


chosen theme
P1 Devise project aims and objectives for a chosen scenario.

P2 Produce a project management plan that covers aspects of cost, scope,


time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to provide
timeframes and stages for completion.
M1 Produce a comprehensive project management plan, milestone
schedule and project schedule for monitoring and completing the aims and
objectives of the project.
LO2 Conduct small-scale research, information gathering and data
collection to generate knowledge to support the project

P4 Carry out small-scale research by applying qualitative and


quantitative research methods appropriate for meeting project aims and
objectives.
M2 Evaluate the accuracy and reliability of different research methods
applied.
D1 Critically evaluate the project management process and appropriate
research methodologies applied.

JALINA WICKRAMARACHCHI MSCP 5 47


LO3 Present the project and communicate appropriate recommendations
based on meaningful conclusions drawn from the evidence findings and/or
analysis

P5 Analyse research and data using appropriate


tools and techniques.
P6 Communicate appropriate recommendations as a
result of research and data analysis to draw valid and meaningful
conclusions.
M3 Evaluate the selection of appropriate tools and techniques for
accuracy and authenticity to support and justify recommendations.
D2 Critically evaluate the research and data analysis tools used in the
project development stages..
LO4 Reflect on the value gained from conducting the project and its
usefulness to support sustainable organisational performance
P7 Reflect on the value of undertaking the research to meet stated .
objectives and own learning and performance.
M4 Evaluate the value of the project management process and use of
quality research to meet stated objectives and support own learning and
performance.
D3 Critically evaluate how the project supports sustainable
organisational performance.

JALINA WICKRAMARACHCHI MSCP 5 48


JALINA WICKRAMARACHCHI MSCP 5 49

You might also like