You are on page 1of 66

1TASK

Define the scope of the project and devise aims and


objectives of the
project that you are going to carry out. You also should include
a brief
introduction to the selected company, remote working
process and
technologies used, explanation to the project and other
relevant
information about the research.

1.1
What is Project Management?
The use of procedures, techniques, abilities, knowledge, and experience
to accomplish
particular project goals in accordance with predetermined guidelines is
known as
project management. Final deliverables in project management are subject
to a limited amount of time and money.
A basic project management lifecycle covers four stages

Initiation
Planning
Execution
Closure

1.1.1Why is project management important?

Project success depends on having a project manager to take the


initiative and keep everyone on the same page because projects are
frequently complex and include several stakeholders.
Here are six reasons why you should use project management:

Realistic project planning: One cannot stress the value of project


planning.
Organizations frequently overestimate their ability to do tasks fast,
underestimate the expenses, or do both, which is a formula for
disaster.An effective project manager establishes goals, budgets, and
schedules that are reasonable and doable while taking the larger picture
into account. A project may swiftly veer off course before it even gets
started without attentive management.
The project manager consults with various stakeholders to gain an
understanding of the initiative's strategic priorities and business objectives
in order to determine reasonable goals, budgets, and timetables. The
project manager develops a project plan based on their study, balancing
those goals within the limitations of time and money. Resource
management, cost estimation, and risk analysis are all part of this process.

Clear focus and objectives: The most frequent factor contributing


to project failure in 2017 was unclear goals. Project managers assist
businesses in defining their priorities and project goals.
The scope and objectives can quickly become jumbled when project
management is left up to the team. Scope creep, missing deadlines, and
overspending can result from a lack of concentration.In addition, many
teams might not be able to identify possible risk factors as they
emerge without a project manager to supervise the project plans and job
breakdowns. The team may decide to prioritize the wrong tasks if
they don't handle the changing project risks.
 Strategic alignment:
Aligning projects with corporate strategy is one of the most crucial reasons
to utilize project management. "If your company is not strong at
project management, you are putting too much at risk in terms of eventually
delivering on plan," warns Mark Langley, president and CEO of PMI.
In other words, organizational strategy is driven by project management.
Therefore, you are losing a significant chance to develop if you aren't using
it into your activities.
The general objectives of a project, as well as its succeeding tasks and
milestones, are all made sure to be in line with the organization's strategy
by project managers as they supervise the planning and implementation of
a project. Your efforts will advance the company if they are strategically
aligned at every stage of the project, which keeps all
stakeholders on the same page.

Managed process:
The goal of project management is to enable the appropriate
people do the right tasks at the right time in a proactive manner. Many
teams tend to operate reactively handling problems as they come upon
the absence of a defined project management methodology, as opposed
to anticipatorily preparing for known risks and establishing project goals
and parameters from the start.
Project managers work with teams to divide a project into smaller, more
manageable chunks. Project managers may better manage their teams and
respond to problems by dividing the project down into a defined
procedure with assigned tasks,dates and milestones.

Quality control:
Project management is not complete without quality control. Even if
your project is completed on schedule and within the allotted budget, it will
still be considered unsuccessful if the quality requirements aren't
satisfied.Sadly, it's all too simple to slip into this trap. Teams under a lot of
pressure to complete a project on schedule and within a certain
budget. And this could result in hurried effort and subpar performance.
Project managers are useful in this situation. They oversee how well project
duties are carried out in addition to managing timelines and objectives. To
ensure that everyone’s working toward the same goals, project
managers assist in defining quality standards and deliverables.

Reduced costs:
In 2018, 9.9% of every dollar invested was lost owing to subpar project
execution, or $99 million for every $1 billion invested, according to PMI.
Through increased productivity, risk mitigation, and resource
optimization, project management lowers project costs. Even with the
additional expense of hiring a project manager, businesses stand to benefit
far more.

What does project management involve?

Kick - off meeting:


Lay up the facts you have and share the team's aims and high-level
objectives.
Stakeholder analysis:
The people who will be impacted the most by the initiative
should be contacted.
Project scope definition:
Determine the scope, deliverables, and all requirements.

Work Breakdown Structure (WBS):


Break up the project phases into more readily managed, manageable bits
of labor.

Risk management planning:


Determine and prepare for the risks that are most likely to arise during a
project's life cycle.

Project review:
Concluding a project with a debriefing to extract lessons that can be
included into the organization's knowledge base or best practices

1.1.3 Summary of the the project

IT security for remote employees is one of the numerous challenges that
firms must address as they get ready for what life will be like after a
pandemic. Having a remote workforce has several risks. To finish duties,
employees occasionally use their own devices and home networks.

And you better hope they have technological know - how because
your IT team can only do so much to assist them if they run into any
technical problems. About 65% of remote employees reported experiencing
IT issues during the pandemic, and 52% had to wait up to three hours for
the issue to be handled, according to the Velocity Smart Technology
Market Research Report 2022.

However, remote work is here to stay, for better or worse, and the
advantages are quite alluring. In fact, a Gartner poll revealed that 47%
of companies provide workers a choice in their jobs. When asked if
they could work remotely full - time when the epidemic is over, 82% of
respondents claimed they could do so at least once a week.
Sri Lanka Telecom (SLT) is one of the firms that gives workers the option to
work remotely. Employees should evaluate the company's remote working
policies to see whether they are acceptable. A business has just one
second before a catastrophe occurs.
1.1.4
Information about SLT company
SLT - Mobitel is Sri Lanka’s National Mobile Service Provider and a fully
owned subsidiary of Sri Lanka Telecom. The company offers mobile
telephony services, high-speed broadband, Enterprise Solutions, IDD
Services, Mobile Money (mCash) and a host of Value - Added Services.

SLT - Mobitel was the pioneer in South Asia to launch the first
Super - 3.5G HSPA network in South Asia in 2007, and subsequently
trialed HSPA+, MIMO (Multiple Input Multiple Output) in 2009, another
first in the region, Mobitel went on to demonstrate 4G - LTE technology
also for the first time in South Asia in 2011.

Accordingly, SLT - Mobitel launched its 4G - LTE Network in 2013 to


provide unparalleled broadband experience to Sri Lankans. Keeping
ahead with pioneering new technologies, SLT-Mobitel trialed 4.5G LTE-
Advanced Pro Technology with CA (Carrier Aggregation) of three
bands,again for the first time in South Asia in 2016. In 2017, SLT-Mobitel
was able to deploy the first Sub -1G Mobile Broadband Network
in Sri Lanka based on 900MHz spectrum innovatively to provide superior
coverage some rural areas of the country.

In 2018 Mobitel launched the First Commercial 4.5G/4G+ Mobile Network
in South Asia.In April 2019, SLT-Mobitel was the first network in South Asia
to successfully showcase the first 5G deployment over a Mobile Network by
connecting a commercial Mobile smartphone to its 5G network. Fueling
over USD 700mn worth of investments to - date, SLT-Mobitel has shaped
the ICT landscape, experiencing exciting growth – poised to lead the
industry into its next phase of development. A growing customer base
stands testament to SLT-Mobitel’s strong focus laid on customer
centricity.For more information, visit www.sltmobitel.lk or dial 1717 to
reach the Customer Care Hotline.

1.1.5 Initiation of the project and project planning phase

The purpose of this study is to comprehend how the severe Covid-19


epidemic, which started in March 2020 and is still running strong as of this
writing, may affect slightly distant and hybrid work arrangements.Here,
study goals should be on the psychological agreement that exists between
staff and management, especially considering cyber danger.

 Recognize how various firms have maintained or decreased their


exposure to cyber risk while implementing new methods of
functioning.

 Examine the methods employed by leaders in cyber security to


promote and maintain a proactive attitude toward cyber security.

 The best ways to safeguard team members' emotional well-being and


physical health, and to sustain the effectiveness of teamwork.

1.2 Produce a comprehensive project plan including the


following.

Purpose:
Purpose of this research is to study how the abrupt transition to
remote work effects managers and employees, and to see whether,
and in what ways, the involuntary nature of the current remote work
situation changes how remote work is perceived by employees and
managers.Crises are something that we know occur at different times, such
as the IT - crisis in the 2000s and the economic crisis in 2008 and now the
corona crisis. This thesis is timeless in that way that it can be
useful for managers and employees to read and learn what opportunities
and challenges remote work brings and how to manage a crisis by
changing the way of working in a smooth way.
This session offers the chance to prepare and learn about remote work so
that you can effortlessly convert from traditional office work to remote
work in times of crisis, even if the COVID -19 crisis is most likely not
the last one. It will be possible to discover more about how people in
both jobs are adjusting to working remotely, as well as what managers see
as hurdles and potential, and whether there are any specific challenges
among employees, by interviewing both employees and
managers.Managers will find our study useful in understanding both their
own organizations and how other managers respond to similar
situations.Our study will be crucial for fostering more openness
between managers and employees. There are benefits and drawbacks to
working remotely, and management should communicate more if there are
issues, they really aren't aware of. The key to remote work's effectiveness
is knowing how to manage its drawbacks while keeping its
benefits.Whether the experience is short-term or long-term, the
business must think that the guidance offered by subject-matter specialists
may lessen some of the problems faced by both employees and managers.
Many people's everyday tasks have altered as a result of the crisis, and it is
intended that the this thesis will show them how.

Costs management plan :

Cost estimation comes when the project manager calculates the cost of
the resources selected during resource planning at this stage.
Due to the complexity of cost estimation, the project manager must
estimate the cost carefully and accurately by considering a number of
different aspects. The most constant elements are overhead costs,
corporate budgets, inflation, and fixed and variable costs.
It is important to remember that accuracy in cost estimates is
essential because the greater the difference between the projected cost
and the actual cost, the less likely the project will be successful. Many
estimation methods and models should be used, including analog
estimation, parametric modeling, and the program evaluation and
review method.

Scope management plan:

Given that this crisis situation is unusual, studying a topic as current as this
is of utmost theoretical relevance. This extensive shift offers considerable
opportunity for remote work for many employees and supervisors. Even
though the opportunity, time, and scope for testing telework theory
are somewhat constrained, this research should nevertheless offer
valuable information that can be used to enhance the study of telework.
Given the abrupt and unanticipated move to remote work, this
circumstance will really test the trade - offs of remote work in terms of
productivity vs socializing and isolation.

Quality management plan :


The most crucial aspect of every project is the project's quality.project
manager must maintain excellent quality to ensure that the best end results
are delivered to stakeholdersand clients. As a result, project quality
management is a critical part of the project. However, the challenge that
emerges here is how to assure the project's quality.
Here comes the project quality management plan! A project quality
management plan specifies specific project requirements, project
deliverables, quality measurements, and quality assurance and
improvement procedures. Indicators of key performance KPIs and other
quality measurements and indicators aid in determining if output goals and
objectives have been fulfilled.A quality management plan directs the project
team to adhere to specified processes in order to fulfill quality
requirements.Because the project quality management plan is such an
important element of the project life cycle, you must create an effective
quality management plan. Here's a step-by-step approach to helping you
write your plan:

Time management plan:

It is preferable to arrive three hours early rather than one minute late.
You've probably heard the popular proverb about the value of time.
Punctuality is a skill that not everyone possesses. However, time is the
most crucial factor of any project for project managers. Time
management is one of the ten knowledge areas in which a project
manager must excel in order to obtain the Project Management
Professional (PMP) certification.Poor time management skills lead to late
project delivery, which not only casts doubt on your abilities but also
negatively affects your company's reputation. As you prepare the initial
plans for your project, a time management plan is important.
It gives you specific instructions on how much time you should spend on
certain project activity. A suitable timeline and program helpguarantee that
you stay on track.

Risk management plan :


Every day, a project manager must accomplish hundreds of obligations
till the project is done. Communication is one such obligation. Effective
communication keeps your team on the same page throughout the
project.It also assures openness and the proper separation
of tasks.Every seasoned project manager understands that without a
project communication management strategy, it is impossible to assure
that the project is on track. A communication management strategy
assists in the identification of communication networks, people,
and information flow. The team is continually in contact with stakeholders
and consumers thanks to a communication management plan. It enables
stakeholders and consumers to submit input, allowing the team to make
necessary adjustments in a timely way and boost project efficiency.

Resources management plan :

A project resource management strategy is an essential component of


every project plan. It identifies the availability and utilization of resources. It
gives guidance for using resources in a cost-effective and efficient
manner. A strong project resource management strategy guarantees that
all necessary resources are accessible in enough numbers, ensuring
the project's safety.
Labor, materials, and equipment are all examples of project
resources. A project resource management plan serves as a thorough
guide at the appropriate moment to include and maximize each of these
available resources. It lowers project risk. You must first
create an effective project resource management strategy before you can
implement it.

Delimitation:
This research is only focused on one Sri Lanka Telecom company
due to time restrictions and accessibility. Since various nations have varied
levels of lockdown, with Sri Lanka on the more lenient end of the
lockdown and related suggestions, this will constrain the conclusions of the
thesis.In order to make the research about remote work during the
COVID-19 situation, when the solutions would presumably be less
serious,more applicable to the broader public, news items were picked.

1.2.1 Work breakdown structure

Vulnerabilities
Research Project
1.
Initiation
2.
Planning
3.
Executing
4.
Closure
1.1
Define Processes
1.2
Analyze
Requirement
1.3
Project charter
development
1.4
Project charter
approval
2.1
Project Planning
development
2.3
Work
breakdown
Structure
3.1
Brainstorming
Vulnerabilities
3.2
Solicitation
4.1
Project
Analyze
2.4
Gantt chart
3.3
Vulnerabilities
Research
tool
development
4.2
Project reports

2TASK
Carry out research to investigate the cyber security risks of
remote working by applying appropriate qualitative and
quantitative research methodologies and critically evaluate the
reliability, accuracy and the appropriateness of the research
methods applied. your answer also should include a critical
evaluation of the project management process and a
justification to the selected research methodologies.

2.1
Project execution phase Methods used for information
gathering, data collection and material resourcing

Information may be gathered from a variety of sources. Most critically,


there are no optimum data gathering methods. In general, the method
used to gather data is determined by the nature of the researcher's
research or the phenomenon being examined.
Data gathering is an essential component of every degree of research
effort. If the data is obtained incorrectly, it will undoubtedly alter the
study's conclusions, leading to erroneous or valuable results.

What is data collection?

Before we establish data gathering, we must first define data. The short
answer is that data is any type of information that has been structured in a
specific way. As a result, data collecting is defined as the act of
obtaining, measuring, and analyzing correct data from a number of
relevant sources in order to identify solutions to study issues, answer
questions, evaluate results, and anticipate trends and probability.
Our civilization is heavily reliant on data, emphasizing the significance
of data collection. To make educated business decisions, assure
quality assurance, and maintain research integrity, accurate data
collecting is required.
During data collecting, researchers must identify data categories,
data sources, and data collection techniques. We will quickly discover
that there are several data collection methods. Data collecting is heavily
used in the scientific, commercial, and government sectors.

Why Do We Need Data Collection?

Before a judge rules in a court of law or a general plan an attack, they


must have as much pertinent data as possible. Informed judgments
result in the best courses of action, and information and data are inter
changeable.As we'll see later, the principle of data collecting isn't new, but
the world has evolved. Today, there is significantly more data available,
and it exists in formats unheard of a century ago. To stay up with
technology, the data gathering method has had to evolve and develop.
Whether you're in academia attempting to do research or the commercial
sector trying to sell a new product, you need data collecting to assist you
make better decisions.

Methods of data collection


The system of data collection is based on the type of study being
conducted. Depending on the researcher’s research plan and design, there
are several ways data can be collected.
The most commonly used methods are published literature sources,
surveys (email and mail), interviews (telephone, face-to-face or
focus group), observations, documents and records, and experiments.

Literature sources

This entails gathering data from previously published content in the public
domain. Textbooks, government or private company reports,
newspapers, journals, internet published papers and articles are all
examples of literature sources.This type of data collecting is known as
secondary data collection. Compared to primary data gathering, is less
costly and takes less time.

Surveys
A survey is another means of acquiring information for research
purposes. Information is obtained using questionnaires, which are typically
based on individual or group experiences with a particular
occurrence.Thisdata can be gathered in a variety of ways. The most
noteworthy methods are web-based questionnaires and paper-based
questionnaires (printed form). The outcomes of this kind of data collecting
are often simple to analyze.

Interviews

The interview is a qualitative data gathering approach whose outcomes


are based on intense involvement with respondents concerning specific
research. Interviews are typically used to get detailed replies from the
experts being interviewed.Structured (formal), semi-structured, or
unstructured interviews are all possible(informal). In essence, an
interview technique of data collection can be undertaken in
person with the interviewee(s) or over the phone.

Observations
The observation technique of acquiring information is employed by seeing
individuals in a certain circumstance or place at a specific time and
day.Essentially, researchers examine the behavior of the individuals or
situations being investigated. This style of research can be
controlled,natural, or participant driven.Controlled observation occurs when
a researcher follows a set protocol for studying persons or the
surroundings. Natural observation occurs when people are observed in
their natural environment. Participant observation is a technique in which
the researcher becomes a member of the group being researched.

Documents and records



This is the practice of evaluating an organization's existing papers and
records in order to trace changes over time. Records can be tracked by
reviewing phone logs, email
logs, databases, meeting minutes, staff
reports, information logs, and so on.
For example, a company may want to know why there are so many
unfavorable
reviews and complaints about its products or services. In this
situation, the
organization will examine product or service data as well as
employee-customer interactions.
Experiments

Experimental research is a research approach that examines the causal
link between
two variables. One variable can be changed, while the other is measured.
These two
variables are referred to as dependent and independent variables,
respectively.
Data in experimental research is often gathered based on the cause and
effect of the
two variables being researched. This form of research is prevalent
among medical
researchers and employs a quantitative research
methodology. If you are interested in
my services, please send me a note with your requirements. I will respond
as soon as feasible.
2.1.1
Qualitative
vs
quantitative research

The nature of the targeted outcome is one of the variables that
distinguishes qualitative
from quantitative investigations. Qualitative researchers aim to learn
from the
specifics of the testimony of persons they are investigating, often
known as their
informants. During the course of a research, conclusions are
produced by
accumulating, comparing, and assessing the informants' comments and
contribution.
The "why" behind a phenomena, correlation, or behavior is typically
the subject of qualitative study.

In contrast, quantitative data is quantitatively examined to generate a
statistical
picture
of a trend or link. Such statistical findings may provide insight on
cause-and-effect linkages. They may either validate or refute the
study's initial hypothesis. The
consequence, whether great or unpleasant, can raise awareness and
prompt action.
Qualitative Research
Non-numerical data is collected and interpreted using qualitative
research
methodologies. Some qualitative data sources are as follows:

Interviews

Focus groups

Documents


Personal accounts or papers

Cultural records

Observation
The
researcher may conduct interviews or focus groups during a qualitative
study to
obtain data that is not available in current documentation or records.
Interviews and
focus groups can be unstructured or semi-structured to allow for various or
unexpected responses.
In an unstructured or semi-structured style, the researcher might ask open
ended questions and then follow the replies. The replies give a thorough
view of each
individual's knowledge, that are then compared with those of
other research
participants.
Quantitative Research
Quantitative investigations, on the other hand, necessitate various
data gathering
methodologies. Compiling numerical data to investigate causal links among
variables
is one of these strategies. Data gathering methods for this
sort of study include:

Experiments

Questionnaires

Surveys

Database reports
The procedures described above produce data that is suitable for
numerical analysis.
In this situation, questionnaires use a multiple-choice style to provide
countable
answers, such
as yes or no, which may then be converted into quantifiable data.
Qualitative vs. Quantitative Outcomes

The nature of the targeted outcome is one of the variables that
distinguishes qualitative
from quantitative investigations. Qualitative researchers aim to learn from
the specifics
of the testimony of persons they are investigating, often known as
their informants.
During the course of a research, conclusions are produced by
accumulating, comparing,
and assessing the informants' comments and contribution. The "why"
behind a
phenomena, correlation, or behavior is typically the subject of qualitative
study.

In
contrast, quantitative data is quantitatively examined to generate a
statistical picture
of a trend or link. Such statistical findings may provide insight on
cause-and-effect linkages. They may either validate or refute the
study's initial hypothesis. The
consequence, whether great or unpleasant, can raise awareness and
prompt action.
2.1.2
The
cyber security risks of working from home

Working from home can be beneficial for work-life balance, flexibility,
and the
elimination of a commute, but it also introduces a slew of cybersecurity
issues. With
employees relying on personal networks and
occasionally their own devices, new
online tools and services, and extra diversions, regulating security
measures has
become a nightmare for an IT staff.
According to the Velocity Smart Technology Market Research Report
2021,70% of remote employees reported IT issues during the pandemic.
With home working seems to be here to stay, even post-pandemic,
it's critical to assess your security
measures and ensure that everything is operational and secure.

When the epidemic arrived and everyone started working f
rom home, some of your
workers may have begun utilizing their personal gadgets for work.
Whether it's
using mobile phones instead of a work phone, printers, tablets, or laptops,
one of
the biggest hazards is a lack of IT security infrastructure. Many emplo
yees will not
consider verifying that their mobile devices are encrypted when
logging into
corporate accounts, accepting critical conversations from clients,
or having
voicemails in their inbox that contain vital data.

Meanwhile, firms are battling to gov
ern remote workers' usage of phones and other
mobile devices, according to CISO's Benchmark Report 2020. Many
employees use their own devices for two-
factor authentication, and they may have mobile app
versions of instant messaging applications like Teams
and Zoom. Because of the
blurring barriers between personal and professional life, sensitive
information is
more likely to fall into an unsecured environment. There is nothing your IT
staff
can do to shield you from this enormous issue. Indeed, 52% of resp
ondents in
CISCO's research stated that mobile devices pose a significant risk
to cyber
security. Another risk that remotes employees confront is the possibility of
phishing
emails being sent by attackers. These are frauds aimed to trick users into
disclosing
personal information or downloading a malicious file containing a
keylogger. The
perils of phishing should be a major priority at any time, but things are
extremely
dangerous during the coronavirus epidemic.

According to a recent survey, there has be
en a 600% spike in reported phishing
emails since the end of February, with many of them capitalizing on the
pandemic's
uncertainty. To mitigate this risk, all work should be done on a business
laptop that
is subject to remote access security rules. This s
hould include, at a minimum, two-factor authentication, which reduces the
possibility of a thief getting access to an
employee's account. malware and illegal logins are examples of harmful
behavior.
This guarantees that the appropriate tools, like as anti-
malware software and up-to-
date programs, are in place to guard against any hazards.
It also provides your IT staff with control over the organization's IT
infrastructure
and lets them to monitor any dangerous behavior, such as malware
and illegal
logins.There are some overall examples for SLT Mobitel
company face in that situation according to Network engineerofSLT
Mobitel“Mr. Ananda’s”view:

1.
Control the risk:
To mitigate the dangers, each firm with employees who work
from home must develop a rem
ote working policy. It contains guidelines for securely
keeping devices, setting and maintaining strong passwords, and an
acceptable use
policy for viewing non-work-related websites. Organizations should
also explain the
technology solutions they've put in
place to secure sensitive data, as well as how
workers may follow suit. We recommend, for example, using two-
factor authentication
with any third-party service you use. Although it should not be an
issue during the
lockdown, your remote working policy should cover the hazards
associated with
employees handling sensitive information in public settings.
When business resumes, employees may utilize corporate devices in
locations like
trains and cafés, where opportunistic cyber thieves might lurk without
attracting
attention to themselves. Even in the absence of a hostile actor, security
issues are just
as likely to occur. Consider how frequently you hear about employees
misplacing their
laptop, USB flash drive, or documentation.
2.
Unsecure home network connection:
Unsecured personal networks are one of
the primary causes of an increase in cyber security concerns when working
from home.
Employees may remember to update their devices and antivirus
software, but home
router software
upgrades are frequently ignored. Personal routers that are not frequently
updated are vulnerable to security flaws that might lead to data leaks.
Furthermore, firewalls will be installed on enterprise networks to monitor
traffic and
stop any unwanted activities. Many home routers do not have a firewall,
which can lead
to network security holes.
3.
More use of online tools:
Businesses are increasingly more vulnerable to cyber
dangers as they rely more on technology and internet tools. From
cloud storage to emails, attachments, instant messengers, third-
party services and platforms like Teams,
Zoom, Hangouts, and Asana, more and more work are being accomplished
online. This
certainly provides additional opportunities for fraudsters to get access
to company accounts.
4.
Employees can’t spot scams:
Unfortunately, one of the most prevalent security
dangers of working from home comes from workers. Employees
might accidentally
provide hackers access to their devices or corporate files due to
carelessness,
exhaustion,
or a lack of expertise. In fact, according to a Society of Human Resource
Management survey, 35% of employees reported feeling fatigued or
having little
energy while working from home.
Workers are usually far too distracted with their day-to-
day responsibilities to evaluate
cyber security issues, especially if they haven't been educated to do so.
Cybercriminals
are always evolving and upgrading methods to defraud individuals
and steal data,
therefore it should come as no surprise that employees will occasionally fall
for these
deceptions. The quantity of frauds and phishing emails has expanded
significantly
throughout the epidemic, making employee ignorance one of the most
serious security
threats when working from home.
5.
Staff lose sight of security concerns:
Even if your organization has taken the
time to educate employees on cyber security threats, it is possible that they
will lose
sight of or forget about these concerns when working from home. With the
hectic day-to-
day, IT security might slide down people's priority lists, and
employees are more
likely to be slack about security standards if supervisors are not there to
supervise their
behavior.
Furthermore, because to the length of the epidemic and its economic
consequences, some employees may be concerned about their
employment prospects
or financial situation. According to studies, many workers were planning for
the worst-case situation, in which they lost their job, or their firm
went bankrupt. In fact,
according to a Deloitte poll, 26% of respondents were tempted to create
duplicates of
essential firm data as a precaution. Storing internal company data against a
worst-case
scenario highlight how critical it is for businesses to act to prevent the loss
of corporate
data, intellectual property, and, more broadly, to combat the danger of
corporate fraud.
6.
Weak passwords
:
Even if your firm uses VPNs, firewalls, and security tools, your
organization may still be vulnerable if employees use weak
passwords on their
accounts. Rather than attempting to
breach robust security architecture, fraudsters will
initially attempt to crack accounts with weak passwords. To do this,
they employ a variety of technologies, including password generators and
coding bots, to continually
attempt to guess passwords and check accounts for duplicate passwords.
7.
Phishing and ransomware
:
Phishing and ransomware assaults are another huge
hazard to remote employees. Cybercriminals use these scams to trick
victims into
giving personal information or putting dangerous software on
to their devices. This type
of hazard should already be on employees' radar, but the incidence of such
attacks has
increased dramatically during the epidemic.
Phishing emails have increased by almost 600% since the end of February,
according
to a database, as cyber-
criminals seek to capitalize on the fear and uncertainty caused
by the COVID-
19 outbreak. They operate by a criminal impersonating a respectable
source, generally via email, in order to deceive the victim into
revealing login
information or sensitive information. The perpetrator will then take or
lock this
information and demand a ransom.
8.
Unencrypted file sharing
:
While businesses may consider encrypting files
maintained on their network, they may overlook file encryption when data is
transferred
from one location to another. Your organization cannot afford for thieves to
intercept
files as they are transmitted, from client account information to
consumer data and
financial information. When files are taken in this manner, identity theft,
ransomware,
and theft might occur.
9.
Personal devices
:
When the epidemic arrived and everyone started working from
home, some of your workers may have begun utilizing their personal
gadgets for work.
Whether it's using mobile phones instead of a work phone,
printers, tablets, or laptops,
one of the biggest hazards is a lack of IT security infrastructure. Many
employees will
not consider verifying that their mobile devices are encrypted when
logging into
corporate accounts, accepting critical conversations from clients, or having
voicemails
in their inbox that contain vital data.
2.1.3
Field workWork from home at
STL Mobitel

Work from home (WFH) policy at
SLT Mobitel:
What do employees think about the WFH policy at
SLT Mobitel? Explore insights about perks, benefits, and
flexible hours.

Work from home during COVID-19 at SLT Mobitel


How was your experience working at SLTMobitelduring COVID-19? Learn
about working from home owing to COVID-19, as well as employee
leadership permissions.
Work from home support at SLT Mobitel
Does SLT Mobitel’s
management encourage working from home? Investigate the
advantages of working from home, as well as the necessary equipment and
resources.
Work-life balance and flexibility at SLT Mobitel
Does SLT Mobitel's management encourage professional
development? Learn about
flexibility, leaving during the day, and attending appointments.
2.1.4
Remote Agile: Observations on productivity for less mature
teams by
SLT Mobitel

The consequences of COVID
-
19 have pushed the adoption of entirely remote teams,
a trend that is expected to persist long after the epidemic has passed.
Employers all
across the world have begun to embrace the approach, with
businesses such as
Atlassian, Facebook, and Twitter stating that staff would be able to work
from home
on a permanent basis. Many firms claim 44% gains in productivity.
Co-located teams have historically been the emphasis of
SLT
network engineering.
While many current
SLT
Networking teams already have some distributed processes,
the epidemic has prompted the adoption of a completely distributed
model. At this
point, the ways to increasing remote labor productivity and team
engagement are quite
well recognized. This SLT Mob
itel post discusses various actual insights as well as
prospective techniques to tuning remote
SLT
team performance.
One of the important conclusions has been that the productivity gains or
losses from
remote operations are painfully increased by the ma
turity of the
SLT
team, but many
of these may be solved using strategies and tools. various insights about
how distant
operations affect
SLT
team maturity and productivity, particularly for less mature
teams Many of the recommendations are aimed at closing
the productivity gap for less
established
SLT
teams.
Maturity factors impacting remote productivity
Limited product knowledge shaped
resources narrow focus limited rust and
visibility.
Broad product knowledge shaped
resources Hight level rust and account
ability.
2.1.5
Observation 1: Limited informal learning when working remote

Network engineers learn a great deal from their peers through informal and
sometimes unintentional interactions.
For example:

Watching more experienced physical contact problems
can teach dos and don'ts.

Poor Wi-Fi signals and Wi-Fi usage Informal discussions about cable
choices,
algorithms, and technical approaches are critical to building group
knowledge.

These basic troubleshooting steps may not reveal a problem because
some applications perform complex calculations, receive high-
speed video, or interact
with large databases.
This can be difficult to replicate in a fully remote model. Less mature SLT
teams
suffer from a lack of informal learning with more narrowly focused expertise
and
relative levels of networking product knowledge.
Approaches to improve maturity in this area:

Water cooler interactions should be encouraged to use group chat and
messaging
facilities, especially for one-on-
one discussions.

Enable more
opportunities for informal learning. For example, peer code reviews
with online screenshots can help senior team mentor more junior
resources.

Documenting processes and best practices is critical to team productivity.
At the
very least, utilize a group chat or a forum to collect information in
an
unstructured manner.
Establish formal learning time for team members to ask questions
Set aside
formal learning time for team members to document solutions to queries
from
other teams.
2.1.6
Observation 2: Accountability and trust are hard when you can’t
see
each other

One of the most difficult issues for completely remote teams is the loss of
visibility
and line of sight, which can lead to a lack of trust and
accountability. This is
exacerbated when team members have
never worked together before. This can lead to
a situation where significant time is spent micro-managing daily
activities, creating
reports, following up on activities and influencing team performance at a
much finer level than the daily fixed level.
Approaches to improve maturity in this area:

Clarify and validate definition done across the team Ensure work
items are
tracked against definition done in a single source. Use that single source
for all
work progress discussions to avoid low-value status che
cking and reporting
activities.

Concentrate the team on outcomes. When reporting results, they
should be coded.

Use tools to connect the team's output and contributions, as well as
to assure
access and exposure to the tools.
2.1.7
Observation 3: Team chat and
instant messaging are great, but they
can cause implicit bottlenecks

Group chat and instant messaging are critical tools for remote teams.
However, for
less mature teams, group chats can create implicit barriers. Group chat
channels can
fill up quickly with questions and requests, hindering more
experienced team
members trying to respond, and in turn, making it unclear whether
requesters are
getting some of their questions answered.
Potential approaches:

Establish time slots for specialists to answer questions from the rest of the
team. Inform individuals and groups that their demands must be priority.

A call is faster than waiting for a response on the team channel for urgent
matters.

Set up retreats or bring in outside specialists to assist less experienced
team
members.

Set up a mechanism in which every request in group conversations is
assigned an urgency level.
2.1.8
Observation 4: Non-work interactions can help the team
member engage

Mature teams often have a strong feeling of personal connection,
which helps to
promote team identity, engagement, and cooperation. This might be tough
to develop
in a less mature remote team. While there is a plethora of research on the
value of non-work
contacts, getting team members to communicate dynamically outside of
work
can be difficult. Instead, then seeing social time as an extension of work,
the aim is to
make it
engage
, lively, and pleasurable for participants.
Some ideas that have had
generally good results:

Divide your social time into reasonable portions. For example, in the last
five
minutes of each stand
-
up, have a team member (appropriately chosen) speak
about a topic of interest to them. A group exercise can be used to cover
pre-determined themes.

Creating a non-working channel in which team members may post
about
themselves while they are not working
.
2.1.10
Questions to Assistant Managers

What industry does your business operate in?

How many staff do you manage?

How many of these
employees work remotely?

Have you previously managed remote employees?

Have you used any remote work resources (handbooks, advice, etc.)?
Remote work with Leadership

How did you come up with the manner work would be governed? Botto-
up or top-down?
Have
you discussed the adjustment with your staff both before and after they
began
working remotely? What were the expectations before, and how did they
turn out?

How do you assess the effectiveness of remote workers? Is it different from
how they
measure at work?

How do you compare work performance between office work
and remote
employment?

What are your thoughts on working overtime or overworking?

Have you seen any workers suffering with the separation of work and home
life?

Do you strive to assist your staff
separate work and home life? If so, how do you
ensure that your workers separate work and family life when they work
remotely?

What steps have you taken to ensure that your staff have the tools they
need to execute
their jobs?

Do you make certain that they
work in a separate location that is as ergonomic as
possible, or do you allow them to select where they work?

To what extent do you monitor your employees? How has trust between
you and your
staff evolved?

How do you interact with your employees? How ofte
n? What is the difference in
meetings between working in the office and working remotely?

How do you deal with offering feedback when leading remotely? How does
it vary
from the "normal" method of providing feedback?

What are your thoughts/policies on non
-
work conversations? (In general, and during
meetings)

What have you done to encourage colleague socialization? Group
gatherings, for
example, or "water cooler" conversations

How important is it to you that all employees be seen and heard? In

How do you ens
ure that individuals feel heard and included?

How can you ensure your employees' emotional and physical health?

How do your employees seek assistance when it is required? What
about the
difference in needing assistance while working remotely versus working
in an office?
Are the "issues" the same, or do you believe they have separate issues?

How has sick leave and absence evolved since working from home?
About Opportunities and challenges Question
What chances have you observed given the situation with
COVID
-
19 and remote
work?

What challenges do you have while using remote leadership?

What aspect of leadership do you find the most difficult while leading
remotely?

What is "new" about leading remotely versus leading in an office?

How will this condition
affect your working style in the long run following Covid19?
2.1.11
Questions to SLT Company Workers

What are your duties in the organization, and what are you doing/working
on?

Have you ever worked remotely before?

Is your boss used to handling remote
workers?

Have you utilized any handbooks, recommendations, or other resources to
help you
transition to remote work?
Remote working

Where Do you do your work?

What have you done to enhance the ergonomics of your workspace?

What tools/resources has your
management offered for you to build an ergonomic
workspace?

What are your daily routines, and how have they altered since you
worked at the
office?

How do you communicate with your coworkers?

Do you believe it is possible to socialize virtually as you wou
ld normally?

How do you manage your physical and emotional health?

Does your boss check in on you for causes other than work, and if so, how
and how
often?

How essential are fitness and good air quality to you?

Do you believe you are being heard by manage
ment?
What communication channels are employed to remain in touch with
colleagues and
leaders?

What works well with the channels and what would you change?

What do you miss the most about working remotely instead being in an
office?

How would you rate your
personal productivity when working remotely versus in the
office

Is it the same amount of time to do a task remotely as it is in the office?

How will this circumstance affect your working style (in the long run) after
covid-19?(Problems and opportunities)

What challenges do you have while working remotely vs in an office?

What advantages do you obtain from the current scenario of working
remotely as a
result of COVID-19?

How has your need for feedback and assistance evolved when
working remotely
versus in
the office?

How do you keep business and personal life distinct when working
remotely?

Is your management in charge of setting your working hours, or can you
change them
to fit your best times?

Do you find it difficult to combine your professional and pe
rsonal lives?

Is there anything you cannot accomplish remotely?

What type of duties are they? (Something that demands you to be at the
workplace)

Do you have trouble focusing when working remotely? What do you do to
focus?

Which component of working
remotely do you find the most difficult?
3
TASK
3.1
Analyze research data collected to support your research
project using
appropriate tools, techniques and critically evaluate how
selected tools,
techniques uphold authenticity and the accuracy of
the data collected.
3.1.1
What Is Data Analysis?

Although many diverse individuals, companies, and professionals
approach data
analysis in different ways, the majority of them may be reduced into a one-
size-fits-
all description. Data analysis is the process o
f cleansing, manipulating, and analyzing
raw data in order to obtain usable, relevant information to aid in
making educated
business choices. The technique reduces the inherent risks in
decision making by
offering beneficial insights and data, which are frequently displayed as
charts, figures,
tables, and graphs.

A basic example of data analysis is when we make a choice in our
everyday lives to
examine what has happened in the past or what would happen if we
made that
decision. Essentially, this is
assessing the past or the future and making a choice based
on that understanding.
The term "big data" is frequently used in data analytics talks.
Data analysis is critical in transforming huge data into valuable
knowledge. "What
exactly is data?" Let us return to the core question for neophyte
data analysts who
wish to go further by examining big data fundamentals.
3.1.2
Why is Data Analysis Important?

Better consumer targeting:
You don't want to waste your company's important
time, energy, and money creating a
dvertising campaigns for demographic groups who
aren't interested in the items and services you provide. Data analysis can
assist you
choose where to focus your advertising efforts.

You Will Know Your Target Customers Better:
Data analysis measures
how efectively your items and promotions perform among your target
population.
Data analysis may help your company gain a deeper understanding
of your target
audience's buying patterns, disposable money, and areas of frequent
interest. This
information assists firms in setting prices, determining the length of
advertising
campaigns, and even projecting the volume of product required.

Reduce Operational Costs:
Data analysis will show you which sections of your
organization demand more resources and money, and which should be
trimmed back or deleted totally.

Better Problem-Solving Methods:
Decisions that are well-informed are more
likely to be effective. Businesses are informed by data. You can see
where this
development is going. Data analysis assists organizations
in making sound decisions
and avoiding costly blunders.

You Get More Accurate Data:
You need data to make educated judgments, but
there's more to it. The essential information must be correct. Data analysis
assists firms
in obtaining the required information for future marketing strategies,
business
planning, and revamping the company's vision or goal.
3.1.3
Data Analysis about SLT-Mobitel

SLT-Mobitel, as part of the Digital Partnership Program, has entered
into a strategic
collaboration with Softlogic IT to
introduce data exchange and analytics services.
This
enables businesses to adopt an essentially data-
driven approach to solving problems
and gaining deeper insights into data using IZAC's 'Data Exchange
and Analytics
Platform' and MicroStrategy’s tools an
d processes. IZAC is the Global Data Exchange
platform by Whiteclay and MicroStrategy is the largest publicly traded
independent
analytics and business intelligence company. A strong data
management landscape
helps an organization improve its bottom line b
y prioritizing its sales and operations
efforts. Effective use of decision science has also led to greater
clarity in the
organization's messaging and strategy.

The integrated solution will provide enterprises with a subscription-
based intelligent
data management service hosted on the SLT-
Mobitel Akaza cloud platform. This
solution enables enterprises to visualize data patterns and apply predictive
analytics to
make timely decisions and thereby make their business operations more
efficient.
Sri Lanka
Telecom CEO Janaka Abeysinghe said, “SLT-
Mobitel recognizes that data
is the new 'source of truth' for enterprise customers when it comes
to achieving
sustainable growth and fostering innovation. By partnering with SLT in its
journey to
transcend connectivity, cloud and data, we plan to take Sri Lankan
organizations to the
next level of decision-
making using Data Virtualization, Analytics and AI tools on the
Whiteclay platform. Enterprise Digital Transformation"
Mr. Ananda Samarakoon,
CEO, Whiteclay (Pte) Ltd said, “The true value of data science is realized
when you
have a good data engineering stack. In today's world, the lack of a
strong data
background should not hinder any organization from gaining quick insights
from data.

“If a trend line can be identified in the data, analysts should be able to ask
the system
'what changed', giving them the flexibility to slice and dice data at a real
-
time level and
generate a dashboard. their will. If they don't need the dashboard after a
few days, they
can discard
or edit it. But the point is, deploying such systems in any
organization's
environment requires a lot of effort from the technology, strategy and
finance teams.
3.1.4
Data Analysis Tools
Best Data Collection Tools for Interviews
For collecting data through in
terviews, here are a few tools you can use to easily
collect data.

Digital Camera
:
A digital camera has the advantage of being able to transfer photos
to a display screen when necessary.

Audio Recorder:
An audio recorder is a device that records sound
onto a disc, tape,
or film. Audio information may suit a wide range of people's
demands while also
providing alternatives to print data collecting technologies.

Camcorder:
A camcorder is used to record data from interviews. It functions as both
an audio re
corder and a video camera. The data presented is qualitative in
nature,
allowing responders to thoroughly address the questions posed.
Best Data Collection Tools for Reporting
Reporting tools allow you to extract and present data in charts, tables, and
other visuals
so that users can discover relevant information. Non-
Governmental Organization (NGO) reports, newspapers, internet articles,
and medical records might all be used to
gather data for reporting.

NGO Reports
:
NGO reports provide an in
-
depth and
comprehensive report on the
NGO's operations, which encompass subjects such as business and
human rights. The
content in these papers is research
-
specific and serves as an appropriate academic
foundation for data collection. NGOs frequently focus on devel
opment initiatives that
are established to promote certain causes.

Newspapers:
Newspaper data is relatively easy to obtain and is frequently the only
continuous source of event data available. Even if there is a bias
problem with
newspaper data, it is neve
rtheless a legitimate instrument for data collection for
reporting.

Website Articles
:
Another data collecting method is gathering and utilizing data
included in website content. Data collecting from online articles is a faster
and less
expensive method of
data collection. The biases inherent in the data gathering
procedure, as well as potential security/confidentiality problems, are
two main
downsides of employing this data reporting approach.
Data Collection Tools for Observation
Observation involves
the active acquisition of information from a primary source.
Observation can also involve the perception and recording of data
via the use of
scientific instruments. The best tools for Observation are
,

Checklists:
Users can acquire information and make judgements about what they
should know based on state-
specific criteria. They provide systematic methods for
gathering data on certain behaviors, knowledge, and abilities.
Direct observation:
This is an observational research approach for gathering
evaluative data. The evaluator observes the subject in his or her typical
setting without
changing anything.
Data Collection Tools for Focus Groups
A focus group is a way of gathering information that is intensively
guided and
structured around a series
of questions. The meeting's goal is to elicit thorough replies
to these questions from the attendees. The most effective tools for dealing
with focus
groups are

Two-Way:
One group observes another group respond to the moderator's questions.
After hearing
what the other group has to say, the group that listens can foster
additional conversation and perhaps reach different conclusions.

Dueling-Moderator:
Two moderators take on the role of the devil's advocate. The
fundamental advantage of the dueling
-
moderator focus group is that it fosters fresh ideas by presenting
different ways of thinking and varying points of view.
3.1.5
Types of Data Analysis Methods
There Are Some Of Them,
1.
Cluster analysis
:
The process of arranging a set of data
components in such a way
that they are more comparable (in a certain sense) to those in other
groups, thus the
word "clustering." Because clustering has no goal variable, it is
frequently used to
uncover hidden patterns in data. Access is also used to offer context to a
trend or data
collection.
Let's take a look at it from a business standpoint. In an ideal world,
marketers would be able to assess each consumer individually and give
them with the
finest tailored service possible but doing so with a big cus
tomer base is not feasible.
This is where clustering comes in.
By categorizing clients based on demographics, shopping habits, monetary
worth, or
any other element important to your business, you will be able to
quickly optimize
your efforts and provide y
our customers with the greatest experience possible
2.
Cohort analysis
:
This data analysis approach examines and compares a specific
slice of user activity, which may then be grouped with others with
comparable
characteristics. This approach can provide a
wealth of insight into consumer demands
or a solid grasp of a larger target population.
Cohort analysis may be quite valuable
in marketing analysis since it allows you to assess the impact of your ads
on certain
groups of clients.
Consider sending an email campaign enticing customers to sign up for your
website.
Create two variations of the campaign, each with a distinct design, CTA,
and ad text.
Later on, you may use cohort analysis to analyze the campaign's
success over time
and determine which types of
content are causing your consumers to join up,
repurchase, or interact in other ways.
3.
Regression analysis
:
Regression analyzes historical data to determine how one
(linear regression) or more independent variables (multiple regression)
impact the
value o
f a dependent variable. Understanding the link between each variable and
how
it evolved in the past allows you to predict alternative outcomes and
make better
decisions in the future. Let us illustrate with an example. Assume
you conducted a
regression study of your 2019 sales and determined that variables
such as product
quality, shop design, customer service, marketing efforts, and sales
channels all had
an impact on the total result.
You'd want to utilize regression to see which of these variables
changed or whether
any new ones arose in 2020. For example, owing to COVID lockdowns,
you might
not be able to sell as much in your physical store. As a result, your sales
might have decreased overall or grown through your online platforms. You may then de termine
which independent factors influenced the overall performance of your
dependent
variable, yearly sales.
4.
Neural networks:
The neural network serves as the foundation for machine
learning's clever algorithms. It is a type of analytics that aims to u
nderstand how the
human brain generates insights and predicts values with minimum
involvement.
Neural networks learn from every data transaction, which means they
develop and
progress over time.
Predictive analytics is a common use for neural networks. The
re are BI reporting
solutions that have this feature built in, such as data pine’s Predictive
Analytics Tool.
Users may use this tool to rapidly and conveniently produce many types of
forecasts.
Simply pick the data to be processed depending on your KPIs,
and the program will
automatically produce estimates based on historical and current data.
Anyone in your
business may administer it because to its user
-friendly interface; no sophisticated
scientist is required.
5.
Factor analysis:
Factor analysis,
commonly known as "dimension reduction," is a
method of data analysis that describes variability among seen, associated
variables in
terms of a possibly smaller number of unobserved variables known
as factors. The
goal here is to find independent latent va
riables, which are good for simplifying
certain parts.
A customer review of a product is an excellent approach to grasp this data
analysis
process. The initial evaluation is based on several characteristics such as
color, form,
wearability, current trends,
materials, comfort, where they purchased the goods, and
frequency of usage. Depending on what you want to track, the list might be
limitless.
Factor analysis enters the picture in this situation by summing all of these
variables
into homogeneous groupings
, for as grouping the variables color, materials, quality,
and trends into a new latent variable of design.
6.
Data mining:
A data analysis strategy that encompasses engineering metrics and
insights for added value, direction, and context. Data mining uses
exploratory
statistical assessment to find relationships, linkages, patterns, and trends in
order to
develop enhanced knowledge. Adopting a data mining approach is critical
to success
when evaluating how to analyze data; as such, it is a subject worth exa
mining more.
Data pine intelligent data alerts are a good application case for data
mining. They
deliver automatic signals based on certain instructions or occurrences
within a dataset
using artificial intelligence and machine learning. If you're tracking
supply chain
KPIs, for example, you might configure an intelligent alarm to go off when
incorrect
or low
-
quality data surfaces. This allows you to go deep into the problem and
resolve
it quickly and efficiently.
3.1.6
Data Analysis consists of the following
phases:

Data Requirement Gathering

Data Collection

Data Cleaning

Data Analysis

Data Interpretation

Data Visualization
1.
Data Requirement Gathering
:
First and foremost, consider why you want to
do this data analysis. All you need to do is figure out why you're
performing data
analysis. You had to determine what kind of data analysis you wanted to
perform! In
this step, you must select what to analyze a
nd how to assess it, as well as why you are
researching and what methods you will use to do this analysis
2.
Data Collection
:
Following requirement collection, you will have a clear notion
of what you need to measure and what your results should be. It is
now time to gather
data depending on the criteria. Remember that once you've acquired your
data, it must
be processed or structured for analysis. You must keep a journal
containing the
collection date and source of the data as you gather data from multiple
sources.
3.
Data Cleaning
:
Now, whatever data is obtained may be useless or unrelated to
your analysis goal, thus it must be cleansed. The obtained data may
contain duplicate
records, white spaces, or mistakes. The information should be tidy and
error
-free. This
step must be completed before Analysis since the results of Analysis will be
closer to
what you intended.
4.
Data Analysis
:
The data is ready for analysis once it has been gathered, cleansed,
and processed. As you alter data, you may discover that you have all of the
information
you require, or that you need to acquire more. You can utilize data analysis
tools and
software during this phase to assist you comprehend, analyze, and draw
conclusions
based on the requirements.
5.
Data Interpretation:
After
you've analyzed your data, it's time to interpret your
findings. You may describe or explain your data analysis in a variety
of ways,
including in words, a table, or a graphic. Then, based on the outcomes of
your data
analysis, determine the best line of action.
6.
Data Visualization:
Data visualization is quite ubiquitous in everyday life; it is
frequently seen in the form of charts and graphs. In other words,
facts presented
visually to make it easier for the human brain to absorb and digest. Data
visualization
is frequently used to
reveal previously undiscovered facts and patterns. You can
discover useful knowledge by detecting relationships and comparing
datasets.
3.2
Interpretation
3.2.1
Are developers who work remotely more satisfied with the job?
Do remote employees make more money?
With wage cuts implemented in most regions of the world as a result of the
worldwide
pandemic, it is critical to understand earnings before making any
decisions. Let us
compare the salary rates of remote developers
to those of the others.
34%
40%
26%
Average Annual Salary
Full Time Remote
Partially Remote Flexibility Of
work
Not Remove
3.2.3
What are the most common challenges faced when working
remotely?

Meetings, a distracting work environment, and non
-
work responsibilities are the three
most typical
obstacles encountered when working remotely. Non
-
work obligations
include caring for children and doing housework.
Meetings
Distract work environment
Non work comitment
Non development works
Not enough people for the...
Lack of support from management
Toxic work environment
Time Spend Comunting
Challangers
Meetings
Distract work environment
Non work comitment
Non development works
Not enough people for the worklode
Lack of support from management
Toxic work environment
Time Spend Comunting
3.2.4
In what type of organizations are remote work popular?

Smaller firms have a strong culture of remote working.
A noteworthy proportion (read
70%) of remote workers operate in firms with less than 100
employees. So, if you
want to work remotely, your best chance is to join a tiny organization or
build your
own!
3.2.5
Fundamental Types of Interviews in Research

A researcher must conduct interviews with a group of participants when
information
can only be gathered by meeting and personally engaging with a
segment of their
target audience. Interviews provide a venue for researchers to prompt their
subjects
and get information in the appropriate detail.
Percentage of all remote work
Percentage of all remote work
3.2.6
Structured Interviews
Structured interviews are research techniques that are exceedingly
rigorous in their
operations and give very little or no opportunity for pushing participants to
collect and
assess data. As a
result, it is also known as a standardized interview, and its
methodology is heavily quantitative. The questions in this interview
are redecided
based on the level of detail requested.
Advantages of structured interviews

Structured interviews are
particularly planned since they focus on the correctness of
diverse replies.

Data can be gathered. Different respondents provide different types of
replies to the
same structure of questions; the results can be examined together.

They can be used to contact a huge portion of the target demographic.

The standardization provided by structured interviews simplifies the
interview
process.

The same interview structure makes replication across different samples
simple.

Because the breadth of detail is already add
ressed while organizing the interview,
better information can be gathered, and the researcher may conduct
a thorough
analysis of the research topic by asking accurate research questions.

Because the framework of the interview is established, it frequently
produces solid
findings and is easy to implement.

Because the researcher's interaction with the respondent is informal,
the researcher
can easily comprehend the margin of error if the respondent declines to
participate in
the survey or is just uninterested
in delivering accurate information.
3.2.7
Personal Interviews

Personal interviews, in which questions are asked directly to the
respondent, are the
most common form of interviewing. A researcher can use an online survey
guide to
record responses. A researcher
can tailor his or her survey to capture the interviewee's
main thoughts or ideas.
Advantage:

There is a means to alter questions when interviewers and responders are
face-to-face if this is not understood.

If there is uncertainty on both sides or
particular information is provided, more
thorough responses are accessible.

While asking questions and taking notes, the researcher has the chance to
notice and
evaluate the interviewee's body language.

A high rate of reaction.
3.2.8
Telephonic Interviews

Beca
use of the logistics and time savings, telephone interviews are quickly
replacing
traditional "on-site" interviews. It is now more convenient for candidates to
have a
phone chat than go to a faraway place. Although the fact that the individual
does not
have to be physically present during the interview is a clear advantage, it
may also be
one of its distinguishing downsides.
Tips to Clear a Telephonic Interview

Speak clearly and loudly enough to be heard.

Allow the interviewer to do the most of the talking
while presenting the directions so
you comprehend. Speaking at random might also irritate the listener.

Speak with a grin. Smiling when speaking affects the curve of your mouth
as you say
the words, and the listener can immediately detect this tone shift.

Carry a notepad, a pen, and a copy of your CV with you to write
down vital
information.
Advantages:

Having their phone is sufficient to find the interviewers Hand no.

They are frequently inexpensive.

Information is gathered fast.

Personal contact can
also help to clarify misconceptions or offer further information
on questions.
3.2.9
Email or Web Page Interviews

Individual researchers should adapt to this transformation as online
research evolves
as consumers migrate into a more virtual environment.
Interviews done via email or web pages have grown amazingly
popular among the
most commonly utilized interviews nowadays as the number of
individuals with
internet access has increased. Nothing beats an online survey for this. As
more people
purchase online, it is an excellent location to conduct an interview
that provides
information to help them make the best selections.
A
dvantages of email surveys
:

Data acquisition rate

Respondents react at their leisure, when and when they want.

Online surveys can be
used with other research methodologies or used in conjunction
with a variety of pre
-
interview arrangements. They are the tools that will allow you to
complete and pay for the project flawlessly.

A researcher may quickly generate a variety of questions, arg
uments, graphs, and
reports.
4
TASK
4.1
Advantages of Assignments
Assignments are provided to children in order to bridge the gap between
what they learn
at school and what they study at home. Assignments are expected to
create the
required
papers that may be used for further research. To complete the assignment
properly, the
statement or question they attempt must be entirely comprehended.
4.1.1
Technical advantages of assignment writing:
1)
Provides Awareness and Knowledge about
Technical Topic

Teachers give several topics to pupils in order for them to get
technical expertise.
Some things are beyond their theoretical comprehension.

It also aids in widening their cognitive skill horizon. Students are
introduced to
informative insights and important concepts through homework. This is an
excellent
method to form an opinion on the subject.
2)
Writing Skills Are Improved

Assignments requiring you to produce an essay or a paragraph on a certain
topic can
help you develop your writing
abilities. Because designing diverse projects sharpens
students' abilities to write and express their thoughts.

They will be able to communicate and explain better when they
acquire a writing
habit.
3)
Analytical Abilities or Cognitive Abilities Are Also Enhanced

Belittling the value of assignments won’t get us anywhere, as students are
able to
enhance and increase their imaginative and mental skills. Their
rationality is also
improved at the same time.

Assignments provide students the space to experiment and
try out ideas and other
innovative methods to deliver their subject in a unique way.
4)
Research Traits Are Also Enhanced

Students have the option to conduct research on their topic
through
assignments, which allows them to investigate various ideas and
examples
concerning their topic.

Conducting research is a vital and enjoyable activity for the human
brain to
improve its knowledge base. The research that goes into
creating an
assignment enhances students' critical thinking and analytical abilities, as
well
as involves students in the university community and delivers benefits
and
advantages at the professional level.
Gain a lot of experience out of research like:
Time Management

Because time management and other activities go hand in hand, it's one of
the
most
sought-after talents that everyone should acquire.

It would be challenging to coordinate your work if you lack time
management skills.
If you don't manage your time well, you won't get everything done, and you
can even
make bad judgments regarding your work schedule.
Planning and Organizing Skill

You learn to organize and prioritize your work, focusing on the most
important tasks
first. Organizing your work will allow you to finish it with peace of mind
rather than
going through the headache and turm
oil, which will cause you to lose concentration
and miss out on a lot of crucial topics to cover in your assignment when
performing
your research.
5)
Application of Real-Life Examples Improves Learning
This characteristic should be taken into account because
The assignments allow
students to apply and link diverse real
-
life examples with their theme. This method
allows pupils to absorb new levels of knowledge each time they engage in
a new
writing project.
4.2
How to face
Cyber
Security Risks SLT Mobitel company about “Ananda
Samakoon” opinion

The current context of a highly competitive and volatile business
environment, market
saturation of telecom operators, OTT players, rapidly changing
technology and
economic uncertainties are putting pressure on business
operations. Therefore, it is
imperative for an organization to proactively identify business
-critical risks and
manage them effectively. Considering the importance, the Board of
Directors (BOD)
has instructed to implement effective risk management processe
s across the
organization. In accordance with the Board's instructions, SLT
developed the
Enterprise Risk Management (ERM) process and ERM framework.
References have
been made to ERM best practices such as ISO 31000 and COSO, and
proper guidance
in this regard has been obtained from Messrs. Deloitte. With the
implementation of
the ERM process, SLT has begun to identify and manage its operational
risks in day-to-day business operations. Hence, a risk management
culture iscreated in the organization.

A
formal process for reporting risks to the board was introduced to improve
and drive
the ERM process. To support this process, a Risk Management Steering
Committee
(RMSC) was established under the chairmanship of the Group CEO. This
helped to
analyze any acute risks from functional groups and identify key business-
critical risks.
Furthermore, the ERM process has been extended to our
subsidiaries, including
Mobitel, and the Board reviews group risks at the Audit Committee
meeting.

Risk management has now reached maturity in both functional units
and project
management and has become an important (BAU) process. It
encourages senior
executives to embed the risk management process into functional
units. This
empowered them to take properly calculated positive ri
sks (risks with rewards) and to
accept, mitigate, avoid or transfer any negative risks (risks without
rewards). The figure below shows the ERM organization and its
responsibilities with related groups.
Financial risks

Foreign currency fluctuations, fund
management, and increasing operational
expenditures are the key risks associated with our financial assets
and liabilities.
Financial markets remain turbulent, which may raise execution risk for
fund
operations as well as credit risk premiums for market players.

Exposure to foreign exchange fluctuations:
Telecommunications operators
in Sri Lanka work with worldwide vendors to buy services for
telecommunication
system operation and maintenance, as well as hardware and
software applications,
including telecommunication systems. As a result, a substantial amount of
our capital
and operational expenditures is denominated in foreign currencies,
resulting in foreign
exchange translation losses.
The considerable devaluation of the Sri Lanka Rupee throughout the
year had a
significant impact on the Company's commercial and industrial
operations. We are
always trying to increase the amount of foreign cash that flows via
our services to
overseas operators. This creates a natural hedge, reducing our exposure
to currency volatility. Furthermore, we investigate the idea of reducing non-
business vital capital
expenditures and other obligations in order to reduce foreign currency cash
outflows.
Economic Risks

Changes in local, regional, and worldwide economic conditions might
have a significant negative impact on demand for electronic
communications, digital
services, information technology (IT), and associated services, and
hence our
operating and financial performance. Last year, economic performance
decreased in
the second part of the year, causing macroeconomic uncertainty.
Taxation
:
The government's tight tax policy for telecommunications services is
hurting the company's bottom line. To make the service more
affordable, the
government reduced the financing fee on
telecommunications services from 25% to
15%. However, a 15% value added tax (VAT), a 2% nation building tax
(NBT), and
a 2% chess remain charged on telecommunications services.
International
Telecommunications Tax and IDD Tax are also levied on internation
al services.
Because the weight of such levies and taxes rests on the user, demand
and usage of
communications services may be severely impacted.
We, Sri Lanka Telecom
including our mobile arm, Mobitel are cognizant of the price sensitive
nature of our
customers and take proactive measures to prevent such potential revenue
losses.
4.2.1
Reflect on your own learning experience in the Cybersecurity
Vulnerability Project.

Through this project, we were able to learn a lot about the cyber dangers
that come to
such
organizations that earn a lot of income. And Network Engineer Mr.
Ananda
Samarakoon told me the details of cyber-attacks faced by SLT-
Mobitel and how to
prevent it. Told about some new security measures. Over the course
of a year, Sri
Lanka Telecom faced many signal problems. This is due to a cyber-attack
by a hacker.
The hacker took control of SLT's server machine and then gave SLT a
huge amount
of money. But because Sri Lanka Telecom did not agree to it, the
data of many
computers of Sri Lanka Telecom was
destroyed. The company suffered huge losses.
4.2.2
State the cybersecurity project objectives derived from the
project
management process

To keep cybersecurity systems up-to-date, goals must constantly
evolve. such as
switching systems and hacker-implemented technology.

More significantly, it must be adaptable. Security controls are also
provided for
improved monitoring and clarity.

Cloud security is very important everywhere. Furthermore, mobile
security has an
impact wherever the business starts.

Cyber criminals' wares are always evolving. It contributes to the
development otheir
technologies and strategies.
The technology and ideals we rely on every day are expanding. As a
result, current
risk initiation is phenomenal.
4.2.3
Explain how the research project w
ill assist the organization in
maintaining its performance/security in a remote work
environment?

Establishing security controls is really important, and managers and IT
teams should
consider better approaches over time.

Another practice that staff can
take to supplement remote work security is to conduct
a cybersecurity risk assessment.

To meet remote work security challenges, additional layers of security
must be
deployed for every remote worker.

Regarding remote service security, SLT should implement
an asset management tool
that allows members to effectively monitor company assets and
provide greater
visibility to supervisors and management of SLT company assets.
4.2.4
Key to successful learning: aligning assessment with learning
outcomes
The matched curriculum is one of the cornerstones to effective learning.
This implies
that learning objectives are defined, learning experiences are tailored to
help students
reach those outcomes, and well-planned assessment tasks allow
students to
demonstrate achievement of those outcomes.

The learning outcomes are obvious.

The learning experiences are intended to aid in the achievement of
certain learning
goals.

The assessment assignments enable them to demonstrate that they
have met those
learning outcomes
4.2.5
Des
igning assessments which allow students to demonstrate
their
achievement of the learning outcomes

Learning assessment may have a significant impact on students'
educational
experiences. One of the problems of successful assessment is ensuring
close alignment
between learning objectives, learning activities targeted at reaching
learning goals,
and assessment tasks used to determine whether learning goals
have been fulfilled.
Assessment that is matched to learning goals that focus not just on con
tent knowledge
but also on process and capacities is currently best practice.
4.2.6
Key assessment terms
ASSESSMENT
The gathering of data on the kind and extent of learning
outcomes/any process used to estimate learners' learning. The phrase
comes from the
Latin MEASUREMENT Representation of assessment information by a
number or grade
on a scale of some kind. Answers the question, how much?
EVALUATION
Making decisions regarding the worth of a grade and/or the nature
and extent of learning outcomes. Responds to the inquiry, "How
well?"
ASSESSMENT
TASK
A tool or systematic technique for gathering assessment information.
FORMATIVE
ASSESSMENT
Ungraded assessment activity utilized before or during learning to
help planning and/or diagnosis,
and/or to provide feedback on
learning progress/provides advise and feedback that does not
contribute grades to the final outcome.
SUMMATIVE
ASSESSMENT
Graded assessment task used following learning which counts
towards the final result.
VALIDITY
The extent to which an assessment task assesses what it is supposed
to measure.
RELIABILITY
The degree to which the assessment task consistently produces the
same outcome.
NORM-REFERENCED
The performance of a group of learners is used to rank order learners,
often known as 'grading on the curve.' The number of students who
can earn distinctions, credits, passes, or fail is fixed.
CRITERION-REFERENCED
Establishes performance standards, and every learner who meets the
criteria earns the appropriate grade. Every student has the capacity
to get the greatest grade.
STANDARDS-BASED
Establishes the performance criteria and articulates the many degrees
of quality in performance that are linked with a grade. Students are
graded based on the degree of performance they have attained.
AUTHENTIC
ASSESSMENT
Assessment tasks that assess if a student can show their learning
results in a circumstance that is as similar to a real-world context as
feasible.
4.2.7
Evaluation of continuing professional development
Skills
Evidence
of when and how you have
used this skill / Quality
Self-work
The talents within me were identifiable
Operation
Facing difficult situations through the
research helped build character and gain
new knowledge
communication
Communication skills improvement
through interview research
Problem solving
Always had the curiosity of problem
solving, through this study, the skill had
room to improve immensely
Achieving aims
Satisfaction, inspiration, and overall
improvement in decision making
Research
Expand
knowledge base for the research
topic
Interpersonal skills
Self-esteem, open-mindedness, awareness
of one's own thoughts, the ability to learn,
the ability to comprehend and regulate
one's own emotions, self-confidence, self-discipline, self-motivation,
the ability to
overcome boredom, patience
4.2.8
Reflection of the work
Given the current epidemic, I assumed there would be a dramatic shift to
remote work.
Working and leading remotely is tough for organizational members with
little or no
expertise. Those study data indicate the inverse. The change is handled
successfully
by both management and staff.
Productivity is same or improved, attention is raised,
meetings are more efficient, and future prospects are improved. Even in
firms with no
history of remote
work initiatives, remote work thrives. However, the questioned
employees and secondary sources prefer telecommuting (working from
home 1-
3 days a week) to a completely remote office. People still require the
sociability of the
workplace and miss it when fo
rced to work from home. Finding a happy medium
between remote and office work will be critical to retaining the
positives and
balancing the negatives. Managers must be flexible in order for each
employee to
develop an appropriate schedule that balances rem
ote and office work.
Even if remote labor is mostly voluntary in this situation, the perks
and downsides
transfer pretty effectively. This means that, even if the duration of
the crisis is
unpredictable, it may be worthwhile to make the appropriate
invest
ments
(ergonomics, video conferencing, increased socializing, etc.) now
rather than later,
especially if the intention is to allow for more remote work in the future.
Managers
will need to be more involved in elements of work that have previously
been natural
and independent at the office. Specifically, communication and
sociability among
employees. Because the break room is no longer available, individuals
must find other
places to interact. Facilitating this new sort of socializing will be critical to
ensuring a
happy and healthy workforce. I propose that video chatting become a
priority in order
to reintroduce some body language into conversation. Perhaps a virtual
break room
might be created with an open video chat server where individuals can
come and go as they like.
Although video chats might be difficult at first, many industry
professionals with
considerable expertise in remote work advocate them to bring some
personality back
into communication. I also feel that when evaluating employee resources,
the long-term health implications of less-than-ideal workplaces must be
considered. It may not
be sufficient to provide them workstations from the workplace, but
rather to have
desks sent to their houses. Fresh air and exercise should be prioritized,
and managers
should find methods to reward them among their personnel. Make it
a game and
reward those that exercise on a daily basis. Although no one can forecast
the future,
we must anticipate that remote work will become significantly more
widespread
following COVID-19. Adaptability and flexibility on the part of both
managers and
employees will be critical to organizational success. So far, remote work
has served
the majority well, and we must hope that trend continues; nevertheless, it
can only do
so with the cooperation of
all members of the organization.
4.2.9
Future Research

The long-term implications of COVID-19-induced telework programs
are yet
unknown.
Longitudinal research has looked at how telework affects physical and
mental health,
relationships, organizational
isolation, and overall telework cohesiveness and
productivity. We can only see the short-term effects of remote work during
a crisis in
this study; the long-term benefits and drawbacks must be investigated
further.
However, the findings were broadly consis
tent with past research, and we see no
reason why it would not have had a good impact. It will also be fascinating
to examine
how managers handle crises and long-term remote employment.
4.2.10
Important of project management

Time management, planning ahead, an
d developing a work calendar for the team are
all essential.

It clearly specifies the project's plan before it begins.

Creates an agreed-upon timeline and plan.

It lays the groundwork for collaboration.

Resources are used wisely.

Aids in integration manage
ment.

It aids in cost control.
Quality is continually controlled.

The project's strategic framework
5
Reference

Cyber Security Risks
2021/10/8 Online
Available at:
https://www.kaspersky.com/

The
Company
2021/10/8 Online
Available at:
https://www.mobitel.lk/the
-
company

What Is Data Collection
2021/10/8 Online
Available at:
https://www.simplilearn.com/what-is-data-collection-article

Qualitative vs. Quantitative
2021/10/8 Online
Available at:
https://www.scribbr.com/methodology/qualitative-quantitative-research/
Risk Management
2021/10/8 Online
Available at:
https://www.slt.lk/reports-html/annual/2018/

Cybersecurity Objectives
2021/10/8 Online
Available at:
https://www.cybersecurity-automation.com/
Special Reference: Ananda Samarakoon

You might also like