Professional Documents
Culture Documents
Jalina MSCP Assignment
Jalina MSCP Assignment
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing
Project
Internal Verifier
Date
signature
LO1.Establish project aims, objectives and time frames based on the chosen theme
LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts
Resubmission Feedback:
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become detached
for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You
will then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could
be reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct way. I further understand what it means
to copy another’s work.
Assignment Brief
Student Name /ID Number Jalina Prabashwara Wickramarachchi / E127390
Submission Format:
Please note that this is an individual assessment and your report should include
evidences to that you have conducted a research to collect relevant data individually.
LO1 Establish project aims, objectives and timeframes based on the chosen theme.
LO4 Reflect on the value gained from conducting the project and its usefulness to
support sustainable organizational performance.
Research Topic: What are the key cyber security risks of working remotely e.g.
employees downloading unsecure apps or sharing their work devices with family
members?
“The option to work remotely was already being embraced by some businesses in the
pre-pandemic era. These businesses were making some progress to adapt their working
practices to accommodate remote working by allowing those in certain job roles to take
the opportunity to work from home, albeit a day or two a week. However, on the whole
there had been a reluctance to have staff working remotely and this has largely centred
around productivity concerns, security implications and technology issues.
The global pandemic however necessitated and accelerated the move to remote working.
The vast majority of businesses have now shifted some or all of their operations online,
and almost all of their staff are working from home. The enabling force behind this
necessary shift has been the different technologies and platforms that facilitate workers
to achieve business goals remotely. This sudden shift to remote working took place
within weeks and months and has not been without issues. Several surveys conducted
during this period cited business leaders complaining about how technology problems
have impacted their business and employees while working remotely. The biggest issues
remote workers face are being frequently disconnected from corporate networks, slow
file downloads, poor quality of video meetings and long response times when loading
apps. As a result, building secure, effective and integrated technology capability, to
continue this flexibility in the workforce, has now become a priority for all
organisations”. (Pearson, 2020)
You are expected to carry out a small-scale research in order to explore the cyber
security risks of working remotely due to the pandemic, from the standpoint of a
computing professional. The research that you carry out can be based on an
organization that you have access to gather sufficient information to investigate the
cyber security risks of remote working.
TASK – 01
1.1 Define the scope of the project and devise aims and objectives of the project that
you are going to carry out. You also should include a brief introduction to the
selected company, remote working process and technologies used, explanation
to the project and other relevant information about the research.
TASK – 02
Carry out a research to investigate the cyber security risks of remote working by
applying appropriate qualitative and quantitative research methodologies and critically
evaluate the reliability, accuracy and the appropriateness of the research methods
applied. your answer also should include a critical evaluation of the project
management process and a justification to the selected research methodologies.
TASK – 03
TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own
learning experience gained through following a quality research and the project
management process. Critically evaluate the ways in which the research project
carried out supports the organization to sustain its performance/ security in a
remote working environment and how the project supported you to improve your
own learning and performance.
I’d like to offer my best regards to Mr. Geeth Weerasinghe to succeed the semester and the
security module and as well as Mr. Anjana and the other staff members of the Esoft metro
campus and the management those who had contributed.
Table of Figures
FIGURE 1GANTT CHART ...................................................................................................................................... 20
FIGURE 2INSTERGANTT TOOL ............................................................................................................................... 21
FIGURE 3WBS STRUCTURE .................................................................................................................................. 22
FIGURE 4MINMAP FOR BRAINSTORMING STEPS FOR RESEARCH .................................................................................... 28
FIGURE 5BEST 12 TOOLS TO ANALYZE DATA............................................................................................................. 30
FIGURE 6FORM IMAGE 1 ..................................................................................................................................... 31
FIGURE 7FORM IMAGE 2 ..................................................................................................................................... 32
FIGURE 8FORM IMAGE 3 ..................................................................................................................................... 33
FIGURE 9FORM IMAGE 4 ..................................................................................................................................... 34
FIGURE 10Q1 ................................................................................................................................................... 35
FIGURE 11Q2 ................................................................................................................................................... 35
FIGURE 12Q3 ................................................................................................................................................... 36
FIGURE 13Q4 ................................................................................................................................................... 36
FIGURE 14Q5 ................................................................................................................................................... 36
FIGURE 15Q6 ................................................................................................................................................... 37
FIGURE 16Q7 ................................................................................................................................................... 37
FIGURE 17Q8 ................................................................................................................................................... 37
FIGURE 18Q9 ................................................................................................................................................... 38
FIGURE 19Q10 ................................................................................................................................................. 38
FIGURE 20Q11 ................................................................................................................................................. 38
FIGURE 21Q12 ................................................................................................................................................. 39
FIGURE 22Q13 ................................................................................................................................................. 39
FIGURE 29CYBER SECURITY AWARENESS ................................................................................................................. 39
FIGURE 23RESPONSE 1 ....................................................................................................................................... 41
FIGURE 24RESPONSE ......................................................................................................................................... 42
FIGURE 25RESPONSE 3 ....................................................................................................................................... 43
FIGURE 26RESPONSE 4 ....................................................................................................................................... 44
FIGURE 27SPREAD SHEET 1 ................................................................................................................................. 44
FIGURE 28SPREAD SHEET 2 ................................................................................................................................. 45
Table of Tables
TABLE 1COST PLAN ............................................................................................................................................ 17
TABLE 2RESOURCE ALLOCATION ........................................................................................................................... 19
TABLE 3ADVANTAGES AND DISADVANTAGES ........................................................................................................... 23
At present a large number of companies shifted for remote working environment due to
the pandemic situation that was affected in previous two years. Some of were already
provide remote working for selected positions but at present that has been offered for
most of the roles in the company. So those all employees are working from there devises
through online with internet connections. Usually there must be cyber security risks while
they are working.
This research project done with a digital marketing-based agency founded in 2021/02
called Assist who have their operations doing from remote with worldwide employees
and their headquarters is hosted in UK. Mainly they are using their website to handle
orders and clients, using slack and asana to project management, Trello software to time
tracing, Zoom or MS Teams to host meetings. I’d like to offer my regards to the Founder
& CEO of Assist Mr. Carmichael and for the employees supported.
There were 9 employees from UK, Russia, Malesia and India region. There were
marketing executes, project manager, web developers and designers. So, my research to
find key cyber security risks to remote employees in Assist.
Aims
Aims are that what are the expectations of a certain project. So, their ware expectations and
goals of this as well.
• Mainly identify cyber security risks for a remote working company.
• Track solutions for those major issues.
• Take idea about remote agencies operations and management system.
• Contact industry professionals
Objectives
Objectives are that achieve from the specific project.
• Risk mining and drive to success of the project
• Analyze collected information correctly
• Create a meaningful research documentation
Cost Management
The cost of doing this study is dependent on a number of variables, including the research's
scope, methodology, data gathering techniques, project procurement, and other incidental
duties. It is essential to consider each of these elements when allocating the money. Sticking
to the project's scope and completing all tasks by the deadlines set forth are essential for
improved cost management.
The process of deciding, identifying, and regulating the outputs, results, and advantages is
known as scope management. In project management, the phrase "scope" is used to
describe the whole of the results, merits, and labor required to achieve them. Benefits and
outputs of items as well as a firm are discovered in order to improve the overall effect of
globalization at this stage. The range of options for an employee is broad with the new job
opportunity duties and responsibilities. Stakeholders will pose some questions concerning
the business's foreign growth in a main research that will be undertaken.
Time management
A time frame is good to have monitor the research status and the compilation rate in order
to conduct in an efficient way. Mainly for the employees needs a proper time management
because they are in a heavy schedule. So that to succeed the project that needed a good time
management plan.
Quality management
Both quantitative and qualitative research are conducted, and only high-quality findings
from the comparison of quantitative and qualitative data are included in the study. The
individual researcher must have to identify goals and need to drive project to achieve those
goals.
Communication plan
The project management plan aids in improving both formal and informal communication
to enhance international commerce. Communication is a critical component in achieving
Risk management
It is vital to accomplish this in order to conduct fruitful research and to reduce the risks
related to the project management plan. Risk might be taken while working with an
organization. It results in cultural barriers and an increase in project conflicts of interest.
Resources management
No Resources assumption
1 Budget 12, 200 required
2 Tools Google forms
MS office
Questionnaires and forms
Newsletters, notices, shareable posts, Emails and outlook
Project quality management tools/ metrics
Project audit
3 Plans and Gantt chart
Documents WBS structure and communication plan
Project scope
Risk management plan and alternatives
4 Interviewing Founder & CEO of the company / owner
positions Project mangers
Designers and developers
Marketing executives
This is one of the most well-liked and straightforward methods for displaying a table of
events and activities, together with the start date, time, and finish date of each activity. The
Gantt chart is used in project planning and management. Gantt charts are used in project
management to plan and schedule work. A Gantt chart is very useful since it enables you
to break down large projects into an understandable timetable and monitor job progress.
That used a tool called instergantt to create this Gantt chat. It’s a fully online and cloud-
based tool that helped to share charts with the agency employees as well.
A Work Breakdown Structure (WBS) is a hierarchical breakdown of the tasks that must be
completed by the project team in order to meet the project's objectives and produce the
necessary deliverables. The foundation for effective project planning, execution, control,
monitoring, and reporting is a WBS. Separating and designing those project components in
advance will allow them to more effectively manage and employ certain components,
which will boost the project's efficacy. It also integrates size, pricing, and schedule to make
planning and projecting jobs simpler, even when establishing a project to create objectives.
Activity 2
Research Methods
1. Survey
A survey is a research method used for collecting data from a predefined group of
respondents to gain information and insights into various topics of interest. They
can have multiple purposes, and researchers can conduct it in many ways depending
on the methodology chosen and the study’s goal. In the year 2020, research is of
extreme importance, and hence it’s essential for us to understand the benefits of
social research for a target population using the right survey tool. (Anon., 2022)
2. Experiment
Doing test cases to control and manipulate a independent variable and take its
effects on the dependent variable.
3. Observation
Collect technique that participations response and phenomena while the test in
natural settings.
4. Secondary research
Mainly collect data from another research that has done previously.
Advantages Disadvantages
Can test False focus
Large amount of data can be processed Destroy structural biases can still affect
using reliable and consistent procedures quantitative research.
through quantitative data analysis.
Qualitative research
2. Focus Groups
Focus groups are intimate gatherings of fewer workers who are often subject-matter
experts. The moderator's background in leading focus groups is crucial.
The project management method is a style of management that organizes and monitors
programs or projects. This process will proceed with the client's agreement and should be
supported by a contract that focuses on the overall needs and the project's ultimate
management. Project management, according to PMI, is the application of knowledge,
skill, resources, and strategies to a broad range of activities in order to fulfill the criteria of
a specific project. The management process has five steps.
1. Project Initiation
2. Project planning
3. Project Execution
4. Project Monitor and control
5. Project closure
Project Initiation
The project is beginning, and at the most fundamental level, this phase aims to define the
project. Typically, an enterprise situation is where this process starts. You will evaluate the
strategy's viability and realism in this instance. The goal of the study project is to determine
if work on feasibility needs to be done.
This is the initial stage of the project. For the permeation and interview I needed to attend
a MS teams meeting with them.
Project Planning
Once the project has been accepted, the following stage is to put together a project team
and start making plans for the timely and cost-effective management of the project. The
project plan will include the materials, finance, and resource requirements. The strategy
provides your team with guidance and the following,
• Cost
• Scope
• Risk
• Schedule
Execution
Deliverables are created and finished at this stage. If a lot occurs within this period, such
as status updates, meetings, success announcements, and evaluations of outcomes.
All of this entails keeping an eye on the project's success and development while making
sure that everything follows the project management strategy. To make sure that the project
is planned, PMs will need to make changes to plans and services within this time cycle.
To make sure that the project plan is updated, every part of the project must be monitored
and adjusted as necessary. Observe the steps in this regard,
• Scope
• Cost
• Risk
• Quality
• Schedule
Project Closure
This procedure is mirrored. Job terminations are increasingly occurring for direct project
jobs. It is crucial to keep in mind key team members. Some PMs also organize modest
employment parties for those who have contributed to the project as a way of saying thank
you for their work. Additional interviews and questionnaires are observational interviewing
techniques; a questionnaire gives you time to think about your answers and the chance to
recall earlier events and emotions. The statistical technique allows for the speedy retrieval
of a huge number of responses, as well as their quick evaluation and generation in more
useful ways.
The systematic application of statistical and logical techniques to describe the data scope,
modularize the data structure, condense the data representation, illustrate via images, tables,
and graphs, and evaluate statistical inclinations, probability data, and derive meaningful
conclusions known as Data Analysis. These analytical procedures enable us to induce the
underlying inference from data by eliminating the unnecessary chaos created by its rest.
Data generation is a continual process; this makes data analysis a continuous, iterative
process where the collection and performing data analysis simultaneously. Ensuring data
integrity is one of the essential components of data analysis. (kaur, 2022)
Brainstorming
The Delphi method is an approach to predicting that is based on the results of many
rounds of questionnaires sent to a panel of experts. Multiple rounds of
questionnaires are distributed to the group of experts, and after each round, the
anonymous responses are compiled and shared with the group. In other terms, the
Delphi process is a collection of opinions on a certain topic that are often written
down and obtained via questionnaires sent to various subject-matter experts.
Fishbone technique
At present there are various data visualization tools and softwires that can be use to analyze
gathered data in high quality. Here some of them,
• Google Forms
• HubSpost
• Maxqda
• Quirkos
• Qualtrics
• Qda Miner
Google forms is a free tool that offers by google to conduct surveys and analyzed gathered
data in proper manner. I’ve selected as the main data collection and questionnaire creating
tool as google forms. That would be easy to answer following questions and gather answers.
Here’re the main questionnaire that I have created for this research and questionnaire,
For the above survey that there were 8 responses from the employees. There were 9 workers
at the company. There are from various countries in the world such as UK, Malaysia, Russia
and India working in marketing, software engineering and management fields.
Figure 12Q1
Figure 13Q2
Figure 14Q3
Figure 15Q4
5. Are you aware about hackers or data thieves and reactions against them?
Figure 16Q5
Figure 17Q6
7. Are you facing device slow speed issues or crashing while working that or any
other issue with device annoying to work?
Figure 18Q7
Figure 19Q8
Figure 20Q9
Figure 21Q10
Figure 22Q11
Figure 23Q12
13. Looking forward to get ware about solutions for minimize those risks
Figure 24Q13
Reflect on the value of undertaking the research to meet stated objectives and
own learning and performance.
Basically, this research conduct to identify key cyber security risks for remote working
employees. So, for that selected a UK based start-up to gather information about remote
working errors. That needed a questioners and various interview processes for data
gathering and used google forms to data visualization.
It. Was great project to learn tie management and on time working with employees. I’ve
used Gantt charts, WBS structures to effective time management. Mainly working with
employees in a company they are in a packed schedule so we need to plan a quick method
to interview them and collect data. This research helps me to upgrade my time management
skills.
There was a limited budget assigned, So I needed manage it without exceeding the assign
amount. If cost run out then in case that would be limit the research altogether. I had to
create a cost management plan for it. The money and effort would be destroying if forfeited
and written off it that were to happen. Finally, that would be spent according to the plan
that I have created, so it has been spent meaningfully.
The outcome of this project must fulfil the objectives for which it was intended. Previously,
it was believed that the department of quality control was in charge of ensuring quality. In
recent years, the concept of total quality control has gained popularity, with all workers,
from top leadership on down, sharing responsibility for quality.
Planned progress must be at least as fast as actual progress. To ensure that the process is
completed on time or earlier, all important parts must occur by the dates stated for each of
their occurrences. The time frame objective is crucial since it is unlikely that the project
research reader would be pleased with a project's late completion.
I have selected main method as google form questionnaire because it’s easy to supply
answers for employees and as well as visualization process. From 9 employees that 8
employees were supported with the questionnaire. There were 13 questions about major
cyber security risks.
Figure 26Response 1
Here is the spread sheet created using collected data. It’s easy to identify results together
all responses.
According to this research that there is a major Problem with lack of awareness about digital
technology and actions that can be taken at a certain error. As per the result large percentage
of workers are not aware about laws and regulations can take in situation like hacking or
data theft. Some of workers are not have proper devices for specific roles and internet
connections.
There can be errors with their servers and inner management system as well. That can be
initialize at certain points in those responses. So that wants be update those systems as well.
Most of the workers likes to educate about awareness and quick fixes for a such errors.