Professional Documents
Culture Documents
1.1
What is Project Management?
The use of procedures, techniques, abilities, knowledge, and experience
to accomplish
particular project goals in accordance with predetermined guidelines is
known as
project management. Final deliverables in project management are subject
to a limited amount of time and money.
A basic project management lifecycle covers four stages
Initiation
Planning
Execution
Closure
Managed process:
The goal of project management is to enable the appropriate
people do the right tasks at the right time in a proactive manner. Many
teams tend to operate reactively handling problems as they come upon
the absence of a defined project management methodology, as opposed
to anticipatorily preparing for known risks and establishing project goals
and parameters from the start.
Project managers work with teams to divide a project into smaller, more
manageable chunks. Project managers may better manage their teams and
respond to problems by dividing the project down into a defined
procedure with assigned tasks,dates and milestones.
Quality control:
Project management is not complete without quality control. Even if
your project is completed on schedule and within the allotted budget, it will
still be considered unsuccessful if the quality requirements aren't
satisfied.Sadly, it's all too simple to slip into this trap. Teams under a lot of
pressure to complete a project on schedule and within a certain
budget. And this could result in hurried effort and subpar performance.
Project managers are useful in this situation. They oversee how well project
duties are carried out in addition to managing timelines and objectives. To
ensure that everyone’s working toward the same goals, project
managers assist in defining quality standards and deliverables.
Reduced costs:
In 2018, 9.9% of every dollar invested was lost owing to subpar project
execution, or $99 million for every $1 billion invested, according to PMI.
Through increased productivity, risk mitigation, and resource
optimization, project management lowers project costs. Even with the
additional expense of hiring a project manager, businesses stand to benefit
far more.
Project review:
Concluding a project with a debriefing to extract lessons that can be
included into the organization's knowledge base or best practices
IT security for remote employees is one of the numerous challenges that
firms must address as they get ready for what life will be like after a
pandemic. Having a remote workforce has several risks. To finish duties,
employees occasionally use their own devices and home networks.
And you better hope they have technological know - how because
your IT team can only do so much to assist them if they run into any
technical problems. About 65% of remote employees reported experiencing
IT issues during the pandemic, and 52% had to wait up to three hours for
the issue to be handled, according to the Velocity Smart Technology
Market Research Report 2022.
However, remote work is here to stay, for better or worse, and the
advantages are quite alluring. In fact, a Gartner poll revealed that 47%
of companies provide workers a choice in their jobs. When asked if
they could work remotely full - time when the epidemic is over, 82% of
respondents claimed they could do so at least once a week.
Sri Lanka Telecom (SLT) is one of the firms that gives workers the option to
work remotely. Employees should evaluate the company's remote working
policies to see whether they are acceptable. A business has just one
second before a catastrophe occurs.
1.1.4
Information about SLT company
SLT - Mobitel is Sri Lanka’s National Mobile Service Provider and a fully
owned subsidiary of Sri Lanka Telecom. The company offers mobile
telephony services, high-speed broadband, Enterprise Solutions, IDD
Services, Mobile Money (mCash) and a host of Value - Added Services.
SLT - Mobitel was the pioneer in South Asia to launch the first
Super - 3.5G HSPA network in South Asia in 2007, and subsequently
trialed HSPA+, MIMO (Multiple Input Multiple Output) in 2009, another
first in the region, Mobitel went on to demonstrate 4G - LTE technology
also for the first time in South Asia in 2011.
In 2018 Mobitel launched the First Commercial 4.5G/4G+ Mobile Network
in South Asia.In April 2019, SLT-Mobitel was the first network in South Asia
to successfully showcase the first 5G deployment over a Mobile Network by
connecting a commercial Mobile smartphone to its 5G network. Fueling
over USD 700mn worth of investments to - date, SLT-Mobitel has shaped
the ICT landscape, experiencing exciting growth – poised to lead the
industry into its next phase of development. A growing customer base
stands testament to SLT-Mobitel’s strong focus laid on customer
centricity.For more information, visit www.sltmobitel.lk or dial 1717 to
reach the Customer Care Hotline.
Purpose:
Purpose of this research is to study how the abrupt transition to
remote work effects managers and employees, and to see whether,
and in what ways, the involuntary nature of the current remote work
situation changes how remote work is perceived by employees and
managers.Crises are something that we know occur at different times, such
as the IT - crisis in the 2000s and the economic crisis in 2008 and now the
corona crisis. This thesis is timeless in that way that it can be
useful for managers and employees to read and learn what opportunities
and challenges remote work brings and how to manage a crisis by
changing the way of working in a smooth way.
This session offers the chance to prepare and learn about remote work so
that you can effortlessly convert from traditional office work to remote
work in times of crisis, even if the COVID -19 crisis is most likely not
the last one. It will be possible to discover more about how people in
both jobs are adjusting to working remotely, as well as what managers see
as hurdles and potential, and whether there are any specific challenges
among employees, by interviewing both employees and
managers.Managers will find our study useful in understanding both their
own organizations and how other managers respond to similar
situations.Our study will be crucial for fostering more openness
between managers and employees. There are benefits and drawbacks to
working remotely, and management should communicate more if there are
issues, they really aren't aware of. The key to remote work's effectiveness
is knowing how to manage its drawbacks while keeping its
benefits.Whether the experience is short-term or long-term, the
business must think that the guidance offered by subject-matter specialists
may lessen some of the problems faced by both employees and managers.
Many people's everyday tasks have altered as a result of the crisis, and it is
intended that the this thesis will show them how.
Cost estimation comes when the project manager calculates the cost of
the resources selected during resource planning at this stage.
Due to the complexity of cost estimation, the project manager must
estimate the cost carefully and accurately by considering a number of
different aspects. The most constant elements are overhead costs,
corporate budgets, inflation, and fixed and variable costs.
It is important to remember that accuracy in cost estimates is
essential because the greater the difference between the projected cost
and the actual cost, the less likely the project will be successful. Many
estimation methods and models should be used, including analog
estimation, parametric modeling, and the program evaluation and
review method.
Given that this crisis situation is unusual, studying a topic as current as this
is of utmost theoretical relevance. This extensive shift offers considerable
opportunity for remote work for many employees and supervisors. Even
though the opportunity, time, and scope for testing telework theory
are somewhat constrained, this research should nevertheless offer
valuable information that can be used to enhance the study of telework.
Given the abrupt and unanticipated move to remote work, this
circumstance will really test the trade - offs of remote work in terms of
productivity vs socializing and isolation.
It is preferable to arrive three hours early rather than one minute late.
You've probably heard the popular proverb about the value of time.
Punctuality is a skill that not everyone possesses. However, time is the
most crucial factor of any project for project managers. Time
management is one of the ten knowledge areas in which a project
manager must excel in order to obtain the Project Management
Professional (PMP) certification.Poor time management skills lead to late
project delivery, which not only casts doubt on your abilities but also
negatively affects your company's reputation. As you prepare the initial
plans for your project, a time management plan is important.
It gives you specific instructions on how much time you should spend on
certain project activity. A suitable timeline and program helpguarantee that
you stay on track.
Delimitation:
This research is only focused on one Sri Lanka Telecom company
due to time restrictions and accessibility. Since various nations have varied
levels of lockdown, with Sri Lanka on the more lenient end of the
lockdown and related suggestions, this will constrain the conclusions of the
thesis.In order to make the research about remote work during the
COVID-19 situation, when the solutions would presumably be less
serious,more applicable to the broader public, news items were picked.
Vulnerabilities
Research Project
1.
Initiation
2.
Planning
3.
Executing
4.
Closure
1.1
Define Processes
1.2
Analyze
Requirement
1.3
Project charter
development
1.4
Project charter
approval
2.1
Project Planning
development
2.3
Work
breakdown
Structure
3.1
Brainstorming
Vulnerabilities
3.2
Solicitation
4.1
Project
Analyze
2.4
Gantt chart
3.3
Vulnerabilities
Research
tool
development
4.2
Project reports
2TASK
Carry out research to investigate the cyber security risks of
remote working by applying appropriate qualitative and
quantitative research methodologies and critically evaluate the
reliability, accuracy and the appropriateness of the research
methods applied. your answer also should include a critical
evaluation of the project management process and a
justification to the selected research methodologies.
2.1
Project execution phase Methods used for information
gathering, data collection and material resourcing
Before we establish data gathering, we must first define data. The short
answer is that data is any type of information that has been structured in a
specific way. As a result, data collecting is defined as the act of
obtaining, measuring, and analyzing correct data from a number of
relevant sources in order to identify solutions to study issues, answer
questions, evaluate results, and anticipate trends and probability.
Our civilization is heavily reliant on data, emphasizing the significance
of data collection. To make educated business decisions, assure
quality assurance, and maintain research integrity, accurate data
collecting is required.
During data collecting, researchers must identify data categories,
data sources, and data collection techniques. We will quickly discover
that there are several data collection methods. Data collecting is heavily
used in the scientific, commercial, and government sectors.
Literature sources
This entails gathering data from previously published content in the public
domain. Textbooks, government or private company reports,
newspapers, journals, internet published papers and articles are all
examples of literature sources.This type of data collecting is known as
secondary data collection. Compared to primary data gathering, is less
costly and takes less time.
Surveys
A survey is another means of acquiring information for research
purposes. Information is obtained using questionnaires, which are typically
based on individual or group experiences with a particular
occurrence.Thisdata can be gathered in a variety of ways. The most
noteworthy methods are web-based questionnaires and paper-based
questionnaires (printed form). The outcomes of this kind of data collecting
are often simple to analyze.
Interviews
Observations
The observation technique of acquiring information is employed by seeing
individuals in a certain circumstance or place at a specific time and
day.Essentially, researchers examine the behavior of the individuals or
situations being investigated. This style of research can be
controlled,natural, or participant driven.Controlled observation occurs when
a researcher follows a set protocol for studying persons or the
surroundings. Natural observation occurs when people are observed in
their natural environment. Participant observation is a technique in which
the researcher becomes a member of the group being researched.
Personal accounts or papers
Cultural records
Observation
The
researcher may conduct interviews or focus groups during a qualitative
study to
obtain data that is not available in current documentation or records.
Interviews and
focus groups can be unstructured or semi-structured to allow for various or
unexpected responses.
In an unstructured or semi-structured style, the researcher might ask open
ended questions and then follow the replies. The replies give a thorough
view of each
individual's knowledge, that are then compared with those of
other research
participants.
Quantitative Research
Quantitative investigations, on the other hand, necessitate various
data gathering
methodologies. Compiling numerical data to investigate causal links among
variables
is one of these strategies. Data gathering methods for this
sort of study include:
Experiments
Questionnaires
Surveys
Database reports
The procedures described above produce data that is suitable for
numerical analysis.
In this situation, questionnaires use a multiple-choice style to provide
countable
answers, such
as yes or no, which may then be converted into quantifiable data.
Qualitative vs. Quantitative Outcomes
The nature of the targeted outcome is one of the variables that
distinguishes qualitative
from quantitative investigations. Qualitative researchers aim to learn from
the specifics
of the testimony of persons they are investigating, often known as
their informants.
During the course of a research, conclusions are produced by
accumulating, comparing,
and assessing the informants' comments and contribution. The "why"
behind a
phenomena, correlation, or behavior is typically the subject of qualitative
study.
In
contrast, quantitative data is quantitatively examined to generate a
statistical picture
of a trend or link. Such statistical findings may provide insight on
cause-and-effect linkages. They may either validate or refute the
study's initial hypothesis. The
consequence, whether great or unpleasant, can raise awareness and
prompt action.
2.1.2
The
cyber security risks of working from home
Working from home can be beneficial for work-life balance, flexibility,
and the
elimination of a commute, but it also introduces a slew of cybersecurity
issues. With
employees relying on personal networks and
occasionally their own devices, new
online tools and services, and extra diversions, regulating security
measures has
become a nightmare for an IT staff.
According to the Velocity Smart Technology Market Research Report
2021,70% of remote employees reported IT issues during the pandemic.
With home working seems to be here to stay, even post-pandemic,
it's critical to assess your security
measures and ensure that everything is operational and secure.
When the epidemic arrived and everyone started working f
rom home, some of your
workers may have begun utilizing their personal gadgets for work.
Whether it's
using mobile phones instead of a work phone, printers, tablets, or laptops,
one of
the biggest hazards is a lack of IT security infrastructure. Many emplo
yees will not
consider verifying that their mobile devices are encrypted when
logging into
corporate accounts, accepting critical conversations from clients,
or having
voicemails in their inbox that contain vital data.
Meanwhile, firms are battling to gov
ern remote workers' usage of phones and other
mobile devices, according to CISO's Benchmark Report 2020. Many
employees use their own devices for two-
factor authentication, and they may have mobile app
versions of instant messaging applications like Teams
and Zoom. Because of the
blurring barriers between personal and professional life, sensitive
information is
more likely to fall into an unsecured environment. There is nothing your IT
staff
can do to shield you from this enormous issue. Indeed, 52% of resp
ondents in
CISCO's research stated that mobile devices pose a significant risk
to cyber
security. Another risk that remotes employees confront is the possibility of
phishing
emails being sent by attackers. These are frauds aimed to trick users into
disclosing
personal information or downloading a malicious file containing a
keylogger. The
perils of phishing should be a major priority at any time, but things are
extremely
dangerous during the coronavirus epidemic.
According to a recent survey, there has be
en a 600% spike in reported phishing
emails since the end of February, with many of them capitalizing on the
pandemic's
uncertainty. To mitigate this risk, all work should be done on a business
laptop that
is subject to remote access security rules. This s
hould include, at a minimum, two-factor authentication, which reduces the
possibility of a thief getting access to an
employee's account. malware and illegal logins are examples of harmful
behavior.
This guarantees that the appropriate tools, like as anti-
malware software and up-to-
date programs, are in place to guard against any hazards.
It also provides your IT staff with control over the organization's IT
infrastructure
and lets them to monitor any dangerous behavior, such as malware
and illegal
logins.There are some overall examples for SLT Mobitel
company face in that situation according to Network engineerofSLT
Mobitel“Mr. Ananda’s”view:
1.
Control the risk:
To mitigate the dangers, each firm with employees who work
from home must develop a rem
ote working policy. It contains guidelines for securely
keeping devices, setting and maintaining strong passwords, and an
acceptable use
policy for viewing non-work-related websites. Organizations should
also explain the
technology solutions they've put in
place to secure sensitive data, as well as how
workers may follow suit. We recommend, for example, using two-
factor authentication
with any third-party service you use. Although it should not be an
issue during the
lockdown, your remote working policy should cover the hazards
associated with
employees handling sensitive information in public settings.
When business resumes, employees may utilize corporate devices in
locations like
trains and cafés, where opportunistic cyber thieves might lurk without
attracting
attention to themselves. Even in the absence of a hostile actor, security
issues are just
as likely to occur. Consider how frequently you hear about employees
misplacing their
laptop, USB flash drive, or documentation.
2.
Unsecure home network connection:
Unsecured personal networks are one of
the primary causes of an increase in cyber security concerns when working
from home.
Employees may remember to update their devices and antivirus
software, but home
router software
upgrades are frequently ignored. Personal routers that are not frequently
updated are vulnerable to security flaws that might lead to data leaks.
Furthermore, firewalls will be installed on enterprise networks to monitor
traffic and
stop any unwanted activities. Many home routers do not have a firewall,
which can lead
to network security holes.
3.
More use of online tools:
Businesses are increasingly more vulnerable to cyber
dangers as they rely more on technology and internet tools. From
cloud storage to emails, attachments, instant messengers, third-
party services and platforms like Teams,
Zoom, Hangouts, and Asana, more and more work are being accomplished
online. This
certainly provides additional opportunities for fraudsters to get access
to company accounts.
4.
Employees can’t spot scams:
Unfortunately, one of the most prevalent security
dangers of working from home comes from workers. Employees
might accidentally
provide hackers access to their devices or corporate files due to
carelessness,
exhaustion,
or a lack of expertise. In fact, according to a Society of Human Resource
Management survey, 35% of employees reported feeling fatigued or
having little
energy while working from home.
Workers are usually far too distracted with their day-to-
day responsibilities to evaluate
cyber security issues, especially if they haven't been educated to do so.
Cybercriminals
are always evolving and upgrading methods to defraud individuals
and steal data,
therefore it should come as no surprise that employees will occasionally fall
for these
deceptions. The quantity of frauds and phishing emails has expanded
significantly
throughout the epidemic, making employee ignorance one of the most
serious security
threats when working from home.
5.
Staff lose sight of security concerns:
Even if your organization has taken the
time to educate employees on cyber security threats, it is possible that they
will lose
sight of or forget about these concerns when working from home. With the
hectic day-to-
day, IT security might slide down people's priority lists, and
employees are more
likely to be slack about security standards if supervisors are not there to
supervise their
behavior.
Furthermore, because to the length of the epidemic and its economic
consequences, some employees may be concerned about their
employment prospects
or financial situation. According to studies, many workers were planning for
the worst-case situation, in which they lost their job, or their firm
went bankrupt. In fact,
according to a Deloitte poll, 26% of respondents were tempted to create
duplicates of
essential firm data as a precaution. Storing internal company data against a
worst-case
scenario highlight how critical it is for businesses to act to prevent the loss
of corporate
data, intellectual property, and, more broadly, to combat the danger of
corporate fraud.
6.
Weak passwords
:
Even if your firm uses VPNs, firewalls, and security tools, your
organization may still be vulnerable if employees use weak
passwords on their
accounts. Rather than attempting to
breach robust security architecture, fraudsters will
initially attempt to crack accounts with weak passwords. To do this,
they employ a variety of technologies, including password generators and
coding bots, to continually
attempt to guess passwords and check accounts for duplicate passwords.
7.
Phishing and ransomware
:
Phishing and ransomware assaults are another huge
hazard to remote employees. Cybercriminals use these scams to trick
victims into
giving personal information or putting dangerous software on
to their devices. This type
of hazard should already be on employees' radar, but the incidence of such
attacks has
increased dramatically during the epidemic.
Phishing emails have increased by almost 600% since the end of February,
according
to a database, as cyber-
criminals seek to capitalize on the fear and uncertainty caused
by the COVID-
19 outbreak. They operate by a criminal impersonating a respectable
source, generally via email, in order to deceive the victim into
revealing login
information or sensitive information. The perpetrator will then take or
lock this
information and demand a ransom.
8.
Unencrypted file sharing
:
While businesses may consider encrypting files
maintained on their network, they may overlook file encryption when data is
transferred
from one location to another. Your organization cannot afford for thieves to
intercept
files as they are transmitted, from client account information to
consumer data and
financial information. When files are taken in this manner, identity theft,
ransomware,
and theft might occur.
9.
Personal devices
:
When the epidemic arrived and everyone started working from
home, some of your workers may have begun utilizing their personal
gadgets for work.
Whether it's using mobile phones instead of a work phone,
printers, tablets, or laptops,
one of the biggest hazards is a lack of IT security infrastructure. Many
employees will
not consider verifying that their mobile devices are encrypted when
logging into
corporate accounts, accepting critical conversations from clients, or having
voicemails
in their inbox that contain vital data.
2.1.3
Field workWork from home at
STL Mobitel
Work from home (WFH) policy at
SLT Mobitel:
What do employees think about the WFH policy at
SLT Mobitel? Explore insights about perks, benefits, and
flexible hours.