You are on page 1of 6

Q1 Project management

is the set of all activities include planning work, assessing risk,


estimating resources required, organizing the work,
assigning tasks, controlling project execution, reporting progress,
analysing results
Project management has Five major variables
1. Scope
2. Time
3. Cost
4. Quality
5. Risk

Information System Project management


A PMIS is a software program or application that organizes and controls the flow
of project data and information

Methods
Following are the methods used for selecting and evaluating information
systems projects

1. Management Structure for


Information Systems Projects
It is based on the hierarchy of an organization and consist of the
following

Corporate strategic planning group


It is responsible for organization strategic plan

Information systems steering committee


It reviews and approve plans for systems in all divisions, it actually
integrates and coordinate all the systems

Project management group


responsible for specific projects
Project team
Responsible for individual projects, i.e. one by one

2. Information systems plan


Identifies systems projects that will deliver most business value,
it links development to business plan
It includes the purpose of plan, strategies development, current
systems, new developments, budgeting and implementation.

3. Strategic analysis or critical success factors approach


It is determined by small number of critical success factors regarding
system information.
In its principal method we interview 3 to 4 top managers to identify goals
and objectives resulting in critical success factor
Suitable for top management, builds decision support system and
executive support system
4. Portfolio analysis
Used to evaluate alternative system projects
Inventories all of the organization’s information systems projects
and assets
Each system has profile of risk and benefit
• High-benefit, low risk
• High-benefit, high risk
• Low-benefit, low risk
• Low-benefit, high risk
To improve return on portfolio, balance risk and
return from systems investments

5. scoring models
Used to evaluate alternative system projects, especially when
many criteria exist, Assigns weights to various features of
system and calculates
weighted totals

Q2 information system problems resulting from poor project


management.
The main factors resulting from poor project management are given
below
Cost overruns
An information system that has problems resulting from poor
project management results from costs that vastly exceed created
budgets
Time slippage
Will exceed the expected time limit and time frame

Technical shortfalls impairing performance


Technical performace will be less than expected , means there will
be no benefits from technology

Failure to obtain anticipated benefits


The benefits expected will not be obtained

Q3
Mobile as the most important digital device we own
A smartphone is a mobile phone that offers more advanced
computing ability and connectivity as compare to normal phone
which is used just for calling A smartphone is considered as a
Personal Pocket Computer (PPC) with mobile phone functions,
because these devices are mainly computers, although much
smaller than a desktop computer. It can do all the work that a
typical computer can do. Furthermore, they are even faster
than computers.

Mobile phones in MIS


Mostly all of the business are becoming online nowadays ie going
towards digital form and MIS plays vital role in the
digitalization of businesses and mobile phone is the single most
important digital deice we own. Because we can do everything
from our pocket. Now we can do businesses from our pocket.
Calculations are made easy, recording, evaluation, purchase and
selling everything is just within the tip of our fingers. Mobile
phones have improved communication in organizations. It also
offers internet everywhere which typical computers cannot
Mobile phone is a full plegde packed by offering camera,
internet, wifi, phone features, computer features, term mobile
phone as the mis business device for the future. we can utilize
all of the implications of television, telephones, digital camera,
gaming through a Smartphone.

Q4 major security risks

Major risks while using credit cards on websites are given below

Outdated software
When the software is outdated, the information can easily be leaked and hacked

Use of cards from local money banks


No Use of secure cards with top of the line banks, because they have higher
security
Full information
Giving full information of credit cards on atm is very risky

Storing credit info


Storing credit card info to pay later is risky because it can easily be breached

Cash prizes or Betting websites


Giving details on such websites is very risky

How to minimize the risk

1. Check if the card is not fake


2. Check if the card chip is not damaged
3. Regularly update the software and website security
4. Use end to end encryption
5. Check appearance of number
6. Check if the card is genuine
7. Do not purchase while connecting to public wifi
8. Do not use primary credit card

You might also like