You are on page 1of 98

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC HND in Computing

Amali Tharika
Assessor Internal Verifier
Unit 06: Managing a Successful Computing Project
Unit(s)
Managing a Project on cyber security risks due to Remote working
Assignment title
Aziel Hewawitharana
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N

Does the assessment decision need


Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals – Summative Assignment Feedback Form

Student Name/ID Aziel Hewawitharana


Unit Title Unit 6 Managing a Successful Computing Project

Assignment Number 1 Assessor


DateReceived1stsub
Submission Date
mission
DateReceived2ndsubmissio
Re-submission Date
n
Assessor Feedback:

LO1.Establish project aims, objectives and time frames based on the chosen theme

Pass, Merit & Distinction P1 P2 P3 M1


Descripts
LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

to support the project

Pass, Merit & Distinction P4 M2 D1


Descripts

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 3


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student AzielHewawitharana@gmail.com Date 2022/10/15


signature

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 4


Pearson
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing Project

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 5


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.

Important Points:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 6


1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information.
eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory
information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be
accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in
writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked
to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A
REFERRAL or at worst you could be expelled from the course

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 7


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Pearson UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this
program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and where I
have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between
myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached to the
attached.

azielhewawitharana@gmai.com 2022/10/15
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 8


Higher National Diploma in Computing

Assignment Brief
Student Name /ID Number Aziel Hewawitharana

Unit Number and Title Unit 6: Managing a Successful Computing Project

Academic Year 2021/20222018

Unit Tutor Amali Tharaka

Assignment Title Vulnerability Assessment - Management Information System Project

Issue Date

Submission Date

IV Name & Date

Submission Format:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 9


The submission should be in the form of an individual report written in a concise, formal business style
using single spacing (refer to the assignment guidelines for more details). You are required to make use
of headings, paragraphs, and subsections as appropriate, and all work must be supported with research and
referenced using Harvard referencing system. Please provide in-text citation and a list of references using
Harvard referencing system.

Please note that this is an individual assessment and your report should include evidences to that you have
conducted a research to collect relevant data individually.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 10


Unit Learning Outcomes:

LO1 Establish project aims, objectives and timeframes based on the chosen theme.

LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.

LO3 Present the project and communicate appropriate recommendations based on meaningful
conclusions drawn from the evidence findings and/or analysis.

LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 11


Assignment Brief and Guidance:

Research Theme: Remote working

Research Topic: What are the key cyber security risks of working remotely e.g. employees
downloading unsecure apps or sharing their work devices with family members?

“The option to work remotely was already being embraced by some businesses in the pre-pandemic era.
These businesses were making some progress to adapt their working practices to accommodate remote
working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or
two a week. However, on the whole there had been a reluctance to have staff working remotely and this
has largely centred around productivity concerns, security implications and technology issues.

The global pandemic however necessitated and accelerated the move to remote working. The vast majority
of businesses have now shifted some or all of their operations online, and almost all of their staff are
working from home. The enabling force behind this necessary shift has been the different technologies
and platforms that facilitate workers to achieve business goals remotely. This sudden shift to remote
working took place within weeks and months and has not been without issues. Several surveys conducted
during this period cited business leaders complaining about how technology problems have impacted
their business and employees while working remotely. The biggest issues remote workers face are being
frequently disconnected from corporate networks, slow file downloads, poor quality of video meetings and
long response times when loading apps. As a result, building secure, effective and integrated technology
capability, to continue this flexibility in the workforce, has now become a priority for all organisations”.
(Pearson, 2020)

You are expected to carry out a small-scale research in order to explore the cyber security risks of
working remotely due to the pandemic, from the standpoint of a computing professional. The
research that you carry out can be based on an organization that you have access to gather sufficient
information to investigate the cyber security risks of remote working.

The report should include,

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 12


 A comprehensive project management plan
 Evaluation of data collection methods and data analysis tools and/or techniques should be
provided
 Appropriate recommendations should be provided
 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance

TASK – 01
1.1 Define the scope of the project and devise aims and objectives of the project that you are going to
carry out. You also should include a brief introduction to the selected company, remote working
process and technologies used, explanation to the project and other relevant information about the
research.

1.2 Produce a comprehensive project plan including the following.


 Cost, scope, time, quality, communication, risk, and resources management plan
 Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones
 Gannt chart to illustrate project schedule with realistic time allocated for each activity and clearly
defined deadlines for milestones.

TASK – 02
Carry out a research to investigate the cyber security risks of remote working by applying appropriate
qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and
the appropriateness of the research methods applied. your answer also should include a critical
evaluation of the project management process and a justification to the selected research methodologies.

TASK – 03

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 13


3.1 Analyse research data collected to support your research project using appropriate tools, techniques
and critically evaluate how selected tools, techniques uphold authenticity and the accuracy of the data
collected.
3.2 Draw valid conclusions and recommendations from the research data analysed and communicate your
recommendations to the top management of the organization through an action plan. The action plan
should include a justification to the recommendations suggested.

TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own learning experience
gained through following a quality research and the project management process. Critically evaluate
the ways in which the research project carried out supports the organization to sustain its
performance/ security in a remote working environment and how the project supported you to
improve your own learning and performance.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 14


Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 15
Grading Rubric
Grading Criteria Achieved Feedback

LO1 Establish project aims, objectives and timeframes based on the


chosen theme
P1 Devise project aims and objectives for a chosen scenario.

P2 Produce a project management plan that covers aspects of cost, scope,


time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to provide
timeframes and stages for completion.
M1 Produce a comprehensive project management plan, milestone
schedule and project schedule for monitoring and completing the aims and
objectives of the project.
LO2 Conduct small-scale research, information gathering and data
collection to generate knowledge to support the project

P4 Carry out small-scale research by applying qualitative and


Quantitative research methods appropriate for meeting project aims and
objectives.
M2 Evaluate the accuracy and reliability of different research methods
applied.
D1 Critically evaluate the project management process and appropriate
research methodologies applied.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 16


LO3 Present the project and communicate appropriate recommendations
based on meaningful conclusions drawn from the evidence findings and/or
analysis

P5 Analyse research and data using appropriate


tools and techniques.
P6 Communicate appropriate recommendations as a
result of research and data analysis to draw valid and meaningful
conclusions.
M3 Evaluate the selection of appropriate tools and techniques for
accuracy and authenticity to support and justify recommendations.
D2 Critically evaluate the research and data analysis tools used in
the project development stages..
LO4 Reflect on the value gained from conducting the project and its
usefulness to support sustainable organisational performance
P7 Reflect on the value of undertaking the research to meet stated .
objectives and own learning and performance.
M4 Evaluate the value of the project management process and use of
quality research to meet stated objectives and support own learning and
performance.
D3 Critically evaluate how the project supports sustainable
organisational performance.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 17


Introduction:

Although working remotely is handy, it's possible for remote workers to unwittingly endanger the networks
and data of your business. Data breaches, unattended computers, and unsecured Wi-Fi connections are just
a few of the possible drawbacks a corporation can encounter. A remote worker with less technological
knowledge might make your business more susceptible to cyber-attacks.

While it is practical and has many advantages, working remotely also exposes businesses and people to a
number of cyber security threats and vulnerabilities. Companies must seriously address remote cyber
security for their remote personnel in today's online-first society.

Even businesses with the finest security procedures and cyber security policies can fall victim to inventive
and persistent hackers. They are always searching for weaknesses in tech stacks and remote working
scenarios. And a research claims that they're succeeding, with 66% of U.K. organizations and 57% of
businesses worldwide reporting successful phishing attempts in 2017.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 18


Contents
Introduction:...............................................................................................................18

Task 01: ..................................................................................................................... 22

About LOLC Company: ........................................................................................................................ 22

What is Remote Working? .................................................................................................................... 24

What is the advantages and disadvantages of remote working? ....................................................... 25

What Are the Most Common Security Risks for Remote Work? ..................................................... 28

Project aims and objectives: ...................................................................................................................... 29

The main Aim and Sub-Objectives in the project: ............................................................................. 29

1.2 (M1) Produce a comprehensive project management plan, the plan should include milestone
schedule and project schedule for monitoring and completing the aims and objectives of the
project (P2) that includes cost, scope, time, quality, communication, and risk and resources
management. ...........................................................................................................29

Project Management Plan: ........................................................................................................................ 30

Project management triangle (Triple Constraints): ............................................................................... 30

Project Timeframe (Start date and end date of the project): ................................................................ 32

Project Cost (Expected Budget For This Project): ................................................................................. 33

Project Scope: ............................................................................................................................................. 34

Project quality: ........................................................................................................................................... 34

Communication Plan: ................................................................................................................................ 35

Human resource management plan: ........................................................................................................ 36

Risk and resources: .................................................................................................................................... 40

RACI Matrix............................................................................................................................................... 40

Risk Register: ............................................................................................................................................. 41

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 19


Probability impact matrix: ........................................................................................................................ 43

(P3) Produce a work breakdown structure and a Gantt chart to provide timeframes and stages
for completion: .......................................................................................................... 43

Work Breakdown Structure: .................................................................................................................... 43

Project milestones are list:......................................................................................................................... 45

Milestone Chart:......................................................................................................................................... 47

Task 02: ..................................................................................................................... 48

P4 Carry out small-scale research by applying qualitative and Quantitative research methods
appropriate for meeting project aims and objectives. .............................................. 48

The implications of remote working for the LOLC PLC Company. .................................................... 49

Reliability of quantitative research method: ........................................................................................... 50

Accuracy of quantitative research method: ......................................................................................... 51

Content accuracy: .................................................................................................................................. 51

Internal accuracy: .................................................................................................................................. 51

External accuracy: ................................................................................................................................. 52

Methods of Qualitative Research: ........................................................................................................ 52

Qualitative research methodology questions on my cyber security risks of working remotely: ........ 52

Questionnaires:....................................................................................................................................... 53

Correctness and reliability of the qualitative research methodology used in remote working study:
...................................................................................................................................................................... 64

Advantages of using Questionnaires..................................................................................................... 64

(P5) Analyze research data using appropriate tools and techniques. ...................... 66

Collected Employee Details: .................................................................................................................. 66

Confidentiality Problems: ..................................................................................................................... 68

Integrity issues ............................................................................................................................................ 70

Difficulties with accessibility ................................................................................................................. 72

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 20


Conclusion: ................................................................................................................ 74

Data analysis: .............................................................................................................................................. 74

Data analysis methods: .............................................................................................................................. 74

Qualitative data analysis: .......................................................................................................................... 75

Qualitative data analysis tools and techniques:....................................................................................... 76

Below are some software: .......................................................................................................................... 77

Quantitative data analysis: ........................................................................................................................ 78

Descriptive statistics ................................................................................................................................... 78

Inferential Statistics: .................................................................................................................................. 79

The tools and procedures that will be utilized to analyze the information collected from the survey
questionnaire are listed below: ................................................................................................................. 80

Reliability statistics: ............................................................................................................................... 81

Correlation Analysis: ............................................................................................................................. 83

Descriptive statistics: ............................................................................................................................. 85

Conclusion: ................................................................................................................................................. 89

(P6)Describe appropriate recommendations as a result of research and data analysis to draw


valid and meaningful conclusions ............................................................................ 90

Using confidentiality issues brought on by remote working to identify cyber security problems: 91

Using integrity issues brought on by remote working to identify cyber security problems: .......... 91

Using availability issues brought on by remote working to identify cyber security problems: ...... 91

Action Plan: ................................................................................................................................................ 92

TASK 04 .................................................................................................................... 94

(P7)Provide a reflection on the value of undertaking the research to meet stated objectives with
your own learning and performance which includes a discussion of the project outcomes, its
usefulness to support sustainability of the given organization and its’ performance94

(M4)Evaluate the value of the project management process and use of quality research to meet
stated objectives and support own learning and performance .................................95

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 21


(D2) the decision-making process and changes or developments of the initial project management
plan to support justification of recommendations and learning during the project . 96

References ................................................................................................................. 97

Figure 1 LOLC Logo ....................................................................................................................................... 23


Figure 2 RACI Matrix ...................................................................................................................................... 41
Figure 3 Milestone Chart ................................................................................................................................. 48
Figure 4 Gender of employees (Google forms) ............................................................................................... 66
Figure 5 Age range (Google forms) ................................................................................................................. 66
Figure 6 Education Level (Google Forms) ...................................................................................................... 67
Figure 7 login system requires password ......................................................................................................... 68
Figure 8 using fingerprint scanner ................................................................................................................... 68
Figure 9 Descriptive statistics .......................................................................................................................... 79
Figure 10 Inferential Statistics: ........................................................................................................................ 80

Task 01:

About LOLC Company:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 22


The largest non-banking financial organization in Sri Lanka, LOLC Finance, is famous for providing
cutting-edge, practical financial solutions to fulfill the demands of its clients. We have established
ourselves as a reputable name in the market, guaranteeing that your goals come true regardless of their size
or scope because of the power of the LOLC Group.

Having a distinct identity of its own, LOLC Financing PLC is a leading regulated finance firm in Sri
Lanka. As one of the LOLC Group's cornerstone companies, we have stayed committed to closing the
accomplishment gap by providing unwavering quality, complete client satisfaction, and unmatched
financial competence.

Figure 1 LOLC Logo

Through strategic partnerships and audacious strategies, LOLC Finance, which started with Sri Lanka's
pioneering portfolio of financing solutions, has developed into a beacon of mass empowerment. Its
services are available to high-level corporate executives, small and medium-sized businesses, and
entrepreneurs at the grassroots level. The company's expansion and diversification have allowed it to
expand into industries including Islamic Finance, Auto and SME Finance, Working Capital, and Foreign
Currency Business, while yet maintaining the flexibility to take advantage of new chances for success,
wealth, and growth. (LOLC, 2022)

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 23


What is Remote Working?

A work style known as remote work does not require the employee to be present in a physical office.
Therefore, remote workers do their business from wherever location they see fit. Companies can recruit
remote workers in their neighborhood, their nation, or elsewhere in the globe.

The rise in remote work over the previous few years will only be amplified by the Covid-19 epidemic in
2020. Technology advancements and perspective changes in management and human resources have made
remote work conceivable. Remote businesses place a high value on written communication,
documentation, team support processes, and a focus on results. Output has seen the most change in the
relationships between companies and employees as a result of remote employment. Managers track the
tasks and KPIs assigned to each employee rather than the number of hours they sat in a chair. (Anon.,
2022)

How remote work interacts with LOLC PLC:

Remote work is the practice of an employee working outside of the main office of the company. Such
locations might include a worker's home, a co-working space, another public space, a private office, or any
other location besides the usual corporate office building or campus. That required LOLC firm workers to
work remotely as well. Employee stress can be lessened, and less time and effort will be required. The
business will gain from this. In other words, the company's products and services, like power, might
depreciate less quickly. Numerous businesses in Sri Lanka and across the world had made arrangements to
work remotely as a result of the Covid-19 issue.
The popularity of remote work increased as technology advanced. For the business, the staff, and their
customers, remote working has simplified numerous duties. Customers may now access their services from
anywhere. Working at a distance has benefits and drawbacks. That instance, when working remotely, there
were several data security difficulties. What are the benefits and drawbacks of working remotely?

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 24


What is the advantages and disadvantages of remote working?

Advantages:
 A better work-life balance is possible while working from home:
Even a few decades ago, working remotely would have been almost impossible for many firms. An
employee had to travel to the workplace to complete their task before there was the appropriate
technology. The drawback of these technical developments? between job and family life are muddled. As a
result, a lot of workers place a high priority on maintaining a healthy work-life balance. The secret to
feeling happier and more productive at work has been the capacity to strike a balance between these two
worlds. Employees can achieve a better work-life balance and add hours to their days by saving the time
they would have spent on a lengthy commute.

 Remote workers have more independence:


It's obvious that the benefits of remote work keep workers content, motivated, and fulfilled. "The
optimal engagement bump happens when employees spend [around] three to four days working off-
site," claims Gallup's State of the American Workplace study. Need to go across the nation to see
family? Or stay at home in the afternoon to watch your kid play soccer? A conventional employee
would have to ask for time off to do that. However, a remote worker can still clock in from their home
or a local office when they arrive and check in as necessary. Employees like the independence of
remote work, which includes the option to work from home, vacation overseas, or visit the office very
sometimes.

 The wellbeing of employees is enhanced by working remotely:


By lowering stress and minimizing exposure to potentially ill coworkers, working remotely may enhance
the health and wellness of employees. There is no commute, lunch rush, or lengthy hours spent in the
office away from family or friends. Employers shouldn't forego a wellness program, though, because
people with flexible schedules need access to employee health programs like gym memberships just as
much.

 Productivity rises when done remotely.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 25


Employers now are debating an age-old existential quandary: "Are they working if I can't see them doing
it?" To achieve more productivity than ever before, companies must be able to trust their workers to do their
jobs even when they are working remotely. According to data, productivity soars when workers are able to
put aside additional distractions like long commutes and extended coffee breaks in favor of concentrating on
their task. For instance, in Stanford University's two-year study on the productivity of remote work, 500
employees were divided into "remote" and "conventional" working groups before being monitored by the
researchers.

 Working from home saves businesses money:

Having fewer employees in the office also reduces costs for a business. How? Imagine a traditional office
space. Do you see a thriving, energetic work center, or are you imagining some of the desks sitting empty,
waiting to be filled with next year’s hires? That ghost town effect is real—and could be costing your
company thousands in wasted spending. With fewer people in the office, companies can condense their
real estate footprint, allowing for more efficient workspace usage.

Disadvantages:

 Feelings of loneliness:
Whether we're talking about workers or bosses, we're all social beings who need one another to survive.
One of the main causes of sadness and poor productivity is isolation.

Be careful to avoid feeling lonely while working remotely, either for yourself as a remote worker or for
your remote employees if you are an employer. To avoid feeling lonely while working remotely, keep in
mind the following key points:
 Work from home and in the office together
 When talking online, use a camera.
 Use conventional methods of communication, like the phone.
 Plan (virtual) get-togethers, team-building activities, etc.
 when you first arrive at work, check in
 Keep anniversaries in mind, and organize casual office gatherings

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 26


 Home distractions and a lack of work-life balance:
There are no workplace distractions when working remotely, but on the other hand, working from home
might present a whole host of new diversions, such as children, pets, hobbies, TV, and so forth.

If a remote worker has a workspace free of these distractions, it is tremendously advantageous.

It could be more difficult to strike the correct balance between work and personal life when working
remotely. There are two major pitfalls. The first is working continuously since the computer desk is
constantly nearby.
For workaholics in particular, this is risky. In the long term, productivity at work rapidly falls if you are
working nonstop without appropriate breaks or any sort of life-work balance.

 Leadership and teamwork might be a little more difficult:


Adjustments and the development of new skills are essential necessary when beginning to work remotely.
Employees must develop their online communication and meeting management skills, as well as their
ability to work remotely with others and utilize a variety of IT technologies.
While new skills are always appreciated and help individuals and businesses advance, the shift may be
challenging. It can be slightly more difficult to manage a remote workforce. Building team spirit may be
more difficult and there may be a sense of powerlessness. The following two recommendations are the best
for distant leaders: Make the transition from being a time-based leader to a results-based leader.
Use your creativity to foster a sense of community.

 Concerns about cyber security:


Security is the top priority for every firm. However, it becomes essential when a business has to support
remote working arrangements. The potential security holes that antivirus software, firewalls, and VPN
arrangements for workers' home internet connections can increase. It gets much more complicated when
staff members use their personal devices on a company network and decide to connect to free Wi-Fi in
cafes and other sites. To lessen the danger of a cyber security disaster, businesses must be sure they can
meet or exceed security criteria before even considering the idea of remote labor.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 27


What Are the Most Common Security Risks for Remote Work?

 gaining access to business data using unprotected internet networks:


Many remote workers access their employer's data over unprotected home wireless networks or the public
Internet. This enables thieves to intercept or steal data as well as access sensitive and secret information.

That is one of the reasons why some businesses mandate that all employees who do remote work use a
Virtual Private Network to access the internet (VPN).

 utilizing personal computers for both work and errands:


Many remote workers utilize their work computers for personal usage as well, especially if they use their
own PCs. In fact, a lot of businesses demand that remote employees utilize their own equipment.
Employees may then store private information on their laptops without any security measures in place,
which creates a danger. A security breach may occur if that employee quits the firm or if the device doesn't
have the most recent security software installed.
A thorough remote work policy that covers cyber security operational guidelines and rules is therefore a
smart idea.

 Weak security passwords:


Even when additional security precautions like VPNs are being implemented, some employees use weak or
obvious passwords for their accounts and applications, which can jeopardize the security of the entire
business.
People who use the same password across all of their accounts are one example; if a cybercriminal
manages to steal one of these accounts, they may then access a huge number of other related accounts.

 Transmitting unencrypted files:


Many businesses make sure that all of their information on a network or server are encrypted, but if those
files aren't encrypted when they're transmitted from one person to another, they might end up in the hands
of hackers.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 28


Due to this, fraudsters may gain access to confidential customer information and use it for malicious
reasons like ransom ware, identity theft, or extortion.

Project aims and objectives:

The COVID-19 situation has altered our business practices. Even while remote work is now the standard,
some companies are more equipped than others to handle the unique issues it presents. Business leaders
must use the right work-from-home strategies in the future to ensure a successful approach to remote work.
When the Objectives and Key Results (OKRs) framework is implemented correctly, teams may
successfully overcome major obstacles to working remotely. The main goal of this project is to learn about
potential cyber security issues that LOLC PLC may encounter when doing remote work and to identify
potential remedies.

The main Aim and Sub-Objectives in the project:

The project's primary objective was to determine how working remotely affected cyber security. In other
words, the Covid-19 malware encouraged LOLC workers to work remotely. But there are significant
security issues with remote work. In other words, there were issues with cyber security like the influence
of hackers, virus entrance, and data theft. To prevent it, it should be planned for in the project. As a result,
the project's goal was to recognize and prevent cyber security problems brought on by working remotely
with LOLC PLC.

1.2 (M1) Produce a comprehensive project management plan, the plan should include milestone
schedule and project schedule for monitoring and completing the aims and objectives of the
project (P2) that includes cost, scope, time, quality, communication, and risk and resources
management.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 29


Project Management Plan:

A project plan is a collection of official papers outlining the project's execution and control phases. In
addition to addressing scope, cost, and schedule baselines, the plan takes risk management, resource
management, and communications into account. Project managers utilize project planning software to
make sure their plans are comprehensive and reliable.

With online Gantt charts that arrange job dependencies, resource hours, labor expenses, milestones, and
more, Project Manager enables you to create thorough project plans.

Project Information:

Project title The impact of Cyber Security risk of Working Remotely with special Emphasis
on LOLC PRIVET LIMITED COMPANY

Project objective

Project Coordinator Aziel Hewawitharana

Client LOLC privet limited company

Duration of the project 03 Month

Budget of the project LKR 14000.00 Date 2022 May 30

Project management triangle (Triple Constraints):

The Triple Constraint is what, then? That's simple—a it's representation of the limitations that come with
project management. These restrictions come in three forms:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 30


1 Cost: The project's financial limitations, usually referred to as the project budget

2 Scope: The activities necessary to achieve the project's objectives

3 Time: The projected completion date for the project

The Triple Constraint basically asserts that the project's price, time frame, and scope all have an effect on
its success. By balancing these three restrictions through trade-offs, you may handle the triple constraint as
a project manager. In the part below, we'll go through how these trade-offs function.

Although the Triple Constraint is a crucial component of any project that succeeds, success is not
determined by it. More than the three components that make up the Triple Constraint are used to construct
projects. In order to more accurately represent the most crucial components of a project, several project
management specialists have added three additional restrictions to the model. These are them:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 31


 Whether an intangible or tangible result is the project's end outcome, there are quality
requirements for all projects. To maintain quality, project managers require a quality
management strategy.
 Risk: Every endeavour has some level of risk. Because of this, project managers must develop a
risk management strategy that details how project risks will be managed.
 Benefit: A project might have a variety of positive effects. The best financial advantage for
project stakeholders must be guaranteed by project managers.
(projectManager, 2022)

Project Timeframe (Start date and end date of the project):

Working remotely poses cyber security risks. To do this, the LOLC Company’s information should be
safeguarded. For so, a project should be created to identify and prevent these security issues. In order to do
that, a project must be begun, and within three months, LOLC Company must have the solutions. The
project's start date was May 20 and its completion date was August 20. In other words, the project needs to
be finished in three months. Time management is required for that. For this, a project schedule should be
made.

Activity Date

Begin End

Finalizing the project 2022 May 20 2022 May 27

Getting the project proposal 2022 May 20 2022 May 27

Topic finalising 2022 May 27 2022 Jun 27

Project management 2022 Jun 05 2022 Jun 10

HR management plan 2022 Jun 13 2022 Jun 15

Scope management 2022 Jun 19 2022 Jun 23

Time management 2022 Jun 23 2022 Jun 27

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 32


Budget planning 2022 Jun 30 2022 Jul 03

Quality Planning 2022 Jul 03 2022 Jul 07

Risk management 2022 Jul 10 2022 Jul 15

Analysis the question 2022 Jul 15 2022 Jul 18

Cyber security issues 2022 Jul 19 2022 Jul 25

Collecting the data 2022 Jul 26 2022 Jul 29

Soluction 2022 Jul 30 2022 Aug 05

Project analysis 2022 Aug 06 2022 Aug 10

Project report 2022 Aug 11 2022 Aug 20

According to the above timeframe, this project will cost us about three months.

Date of commencement of Project Completion Date


the project

2022 MAY 20 2022 AUG 20

Project Cost (Expected Budget For This Project):

The cost of the project must be taken into account by the project manager in order for it to be taken on and
completed. As the manager of the Asian International Institute, I must do this since it is the most crucial
project component. A project's overall cost can be categorized in the following ways. The project
manager's major purpose is the estimated cost required for the project. I've thus estimated the project's cost.
The following details the project's cost:

Accordingly, the estimated amount at the beginning of the project is , RS.12000.00/=

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 33


Task Cost
Papers LKR 1980.00
Printing LKR 1200.00
Network connection LKR 2000.00
For electricity LKR 1000.00
Fuel for transportations LKR 2500.00
For dinner LKR 1500.00
Other LKR 1820.00
Total LKR 12000.00

Some of the expenditures that were incurred throughout the project are listed above. In this case, the
project is anticipated to cost 12,000.00, yet only 9,900.00 has been spent. There was a 2100.00 save as a
result. The leftover sum is likewise specified in this case at the conclusion of the plan.

Project Scope:

As part of the planning process, project scope management assists in identifying and recording a list of all
project objectives, deliverables, due dates, and budgets. Large projects frequently undergo changes as they
go in project management.

The scope here is to improve cyber security in remote working. In this, the employees investigate the
activities that harm the corporate security during remote working from the news and work to identify the
problems here.

Project quality:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 34


The method of project quality management takes into account how to carry out a project in order to
produce deliverables of the appropriate caliber. Project managers must continuously assess the
effectiveness of the procedures and activities used in the project. When it comes to project quality
management, deliverables are measured against predetermined criteria, and course corrections must be
made as needed during the project.

The ultimate objective of project quality management is to ensure that the deliverables meet the
requirements and expectations of clients, stakeholders, or customers, depending on the end-user.
(Anon., 2022)

Communication Plan:

A communication plan is a tactic used by a business to contact the target market and tell people about the
product, service, objectives, or upcoming activities of the brand. It outlines the primary message that must
be sent, the audience that it must reach, and a plan for how your message will be delivered to the chosen
audience. The message, the medium, and the target are the three parts of a communication plan.

The conventional communication strategy usually includes the present state of the firm, business
objectives, target audience, key messages, chosen media, schedule, and metrics for tracking success. Plans
for communication often fall into one of two categories: internal or external. The plan for external
communication is directed towards the company's clients, the general public, governmental organizations,
or investors. A company's internal communication plan is directed at all of its workers or specific subsets
of them, such as those working in a single location or department. (awwawer, n.d.)

Stakeholders Communication Frequency Responsibility Notes


method
Esoft COO Project documents Start of project. Project holder Include project
schedule, key
project deliveries,
Meeting minutes

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 35


Subject Newsletter (Email) Start of project & Project holder Review status
coordinator every Saturday
12.30 p.m.
MSCP Lecture Status report Lecturing Hours Project holder  Include project
(Documents) Saturdays schedule, key
project deliveries

 Meeting minutes
Change request log
and issues log

Sponsors Status report Monthly – first Project holder Informal(monthly)


(project week of Formal(end of
documents) Wednesday each phase)

Organization Status document Start of project Project holder Review project


holder status

Human resource management plan:

Human resource planning is the systematic, continuing process for maximizing the utilization of a
company's most valuable resource—high-caliber people (HRP). Planning for human resources ensures the
best possible fit between job candidates and jobs while avoiding staffing shortages or overuse. These four
essential steps make up the HRP process. They involve planning, balancing anticipated labor demand with
reserves, evaluating the available labor market, and advancing organizational goals. Any company that
wants to sustain efficiency and profitability must have HRP. 2022 (Investopedia.com) Human resource
planning is the systematic, continuing process for ensuring the greatest possible utilization of a business's
most valuable resource—qualified people (HRP). Planning for human resources helps to avoid staff
shortages and overuse of workers while ensuring the best possible fit between people and jobs. The HRP
procedure is made up of these four essential steps. Forecasting, matching anticipated labor demand with
reserve, evaluating the available labor pool, and supporting organizational goals are a few of them. To
preserve efficiency and profitability, every company needs HRP. Investmentpedia.com, 2022

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 36


HUMAN RESOURE PLAN
Document Information:
Project title The impact of Cyber Security risk of Working Remotely with special
Emphasis on LOLC PRIVET LIMITED COMPAN
Prepared by Resource Investigator Document date 05 Jun 2022
Reviewed by Miss. Tharika Amali Reviewed date 05 Jun 2022
No of team members 10 No of team roles 09

Roles and responsibilities:


Role Name Responsibility
Coordinator H.P.D Mandara 1. Developing and putting into practice
appropriate project management standards.

2. Organizing and keeping track of project


activity.

3. Taking care of the project's essential


outcomes.
Assessing the management of the project
through an assessment review.
Resource Investigator Aziel Hewawitharana 1. Resource investigators excel in
compiling the information required for
decision-making.

2. Investigating prospective new clients


and cultivating partnerships

3. The capacity to make quick decisions


and ask others for advice.

4. Speaking with individuals inside and


outside the project.
Implementer H.P.D.Mandara 1. Speaking with the project coordinator for
the team.

2. Organizing the work that the team that


will carry out the project will accomplish

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 37


.
3. Establishing a work schedule and keeping
track of deliverable completion.

4. Handling problems as they arise on a


daily basis.
Shaper sandaru 1. A team that pushes themselves to get
better.
2. Process-focused role modeling
encourages team improvement.

3. Shapers have the will to exert pressure


when others may give up because they
frequently view challenges as exciting
possibilities.

4. One of its drawbacks is that


argumentative team members can be
hurtful to the sentiments of other team
members..
Security Officer Pasindu Sharinda 1. The ability to communicate with cyber
security authorities

2. Has good decision-making and problem-


solving skills.

3. Make friends with the staff and hang out


with them.

4. Security personnel must manage their


time well because of deadlines and other
obligations.
Completer Finisher Mahinsa 1. Task completion is ensured by
completer-finishers.

2. Complete the project and pay close


attention to the details.

3. They maintain a continual sense of


urgency and share it with others to inspire
them to act.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 38


4. To have an obsession with deadlines and
timetable fulfillment.
Monitor Evaluator Dhanushka 1. Improve and develop monitoring,
inspection, and assessment processes
1. Keep track of all project expenses,
activities, and development toward reaching
the project result.
2. Develop monitoring and impact
indicators for the project's success and make
recommendations for future logical
framework enhancement.
3. Support the project's impact and impacts
monitoring and assessment.
Communication Officer Hashan 1. Ensure clear communication between all
parties involved.
2. Improve interactions between team
members through understanding
3. Timely project completion and strategy
formulation.
4. Expand employee relations.
Team Workers Himshara 1. Understanding the purpose and objectives
of the project.
2. Ensuring a correct balance between
project and non-project work.
3. Working to deadlines, staying under
budget, and reporting progress in
accordance with the plan
4. helping to achieve effective
communication

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 39


Risk and resources:

Resource risk is the possibility that you won't have access to all the resources needed to finish a project.

There are numerous variables that might affect this risk, and many of them can be outside your project
manager's control. The potential effect of these risks may be significantly reduced, though, by being able to
recognize them and make plans for them.

If possible, you should build time into your project schedule to address these risks, so that when they do
arise, there are no delays.

RACI Matrix

"Responsible, Accountable, Consulted, and Informed" is the meaning of the abbreviation RACI. The RACI
chart is an illustration of a matrix of responsibilities that displays the cost at the lowest level of activity for
controlling cost and length. It is a charting system that shows the objective of the job at hand as well as the
steps that must be taken by each individual.

This helps to clear up misunderstandings about expectations, which in turn boosts project productivity and
enhances deliverables. Decisions are made more rapidly in this situation, and the effort is allocated fairly.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 40


Is the RACI model, however, the end-all be-all? We'll let you know what the experts in project
management think.

Figure 2 RACI Matrix

Risk Register:

A risk management technique for locating probable project setbacks is a document called a risk register.
This procedure tries to recognize, examine, and address hazards before they become issues. Although it is
frequently used in projects, risk management is also beneficial in production and product launches.

A risk register document, often called a risk register log, keeps track of any hazards that might affect a
particular project. Additionally, it contains details about the risk's importance and propensity to occur.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 41


In addition to identifying and analyzing risks, a project risk register should offer practical countermeasures.
In this approach, your team will be equipped with remedies in case the risk materializes into a more serious
hazard. (Asana, 2022)
Risk Assessment
Risk Risk Risk description Impact Probability Mitigation strategy
No
01 Project Project is not High Low Project coordinator
completing on
Duration should need to be
deadlines
strict on deadlines
02 Project team Problems arise Medium Medium Identifying the
between team problems of the
members. members and solving
them.
03 Hardware Computer problems Medium Low Getting it fixed by a
problems occur occur. hardware engineer.
04 Team members Members also leave Low Low Hiring a backup
the group. member.
05 To travel Emergence of oil High Medium Exchange of
problems information through
whatsapp.
06 Covid 19 Poisoning the Medium Low Working online.
country by covid 19 (zoom )
virus.
07 Budget Increasing inflation Low Low Accumulating more
in the country money,
08 Paper problem Unable to prepare High Low Creating a Google
question papers due Form
to paper problem
09 Finding Failure to locate Medium Low Finding information
information information. using the Internet.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 42


Probability impact matrix:

One of the most popular qualitative evaluation techniques is the Probability and Impact Matrix. It is based
on the two elements of risk: likelihood of occurrence and potential effects on the objective(s). The matrix,
which shows the possibility of the hazards happening and how they could affect the project objectives, is a
two-dimensional grid . The two axes of the matrix are multiplied to determine the risk score, often known
as the risk level or degree of risk.

High

Probability Medium Risk 02 Risk 05


(Likelihood)

Risk 03
Risk 04 Risk 01
Low Risk 06
Risk 07 Risk 08
Risk 09

Low Medium High

Impact (Seriousness)

(P3) Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion:

Work Breakdown Structure:

1. Initiation

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 43


1.1 Finalizing the project
1.2 Getting the project proposal
1.3 Topic finalising
2. Planning
2.1 Project management planning
2.1.1 HR management plan
2.1.1.1 Defining team roles and responsibilities
2.1.1.2 Assigning the team members and team roles
2.1.2 Scope management planning
2.1.2.1 Collecting the Project requirements
2.1.2.2 Define project scope
2.1.2.3 Create WBS
2.1.3 Time management plan
2.1.3.1 Define the activity
2.1.3.2 Sequence the activity
2.1.3.3 Develop the schedule
2.1.3.3 Resource Requirement Plan
2.1.4 Budget planning
2.1.4.1 Breakdown tasks of the project
2.1.4.2 Estimate tasks of the project
2.1.4.3 Total up the estimates
2.1.4.4 Budget
2.1.5 Quality Planning
2.1.5.1 Cost benefit analysis
2.1.5.2 Design of experiments
2.1.5.3 Cost of quality
2.1.6 Risk management planning
2.1.6.1 Risk identification
2.1.6.2 Risk evaluation
2.1.6.3 Risk planning
2.2 Research planning

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 44


2.2.1 Finalizing the research methodology
2.2.2 Create an onion model for project management
2.3. Analysis the question
2.2.1 Confidentiality issues
2.2.2 Integrity issues
2.2.3 Availability issues
2.2.4 Remote working
3. Execution
3.1 Cyber security issues
3.2 Collecting the data
3.3 Solution
4. Closure
4.1 Project analysis
4.2 Project report

Project milestones are list:

The most important stages of your project are highlighted on a horizontal chart called a milestone chart.
With each milestone reached, your team will be one step closer to completing the project. A milestone
chart is an excellent tool for showing project stakeholders how your project is progressing and for retaining
team morale.

That is, the time associated to the period should be separated into the beginning and the end of the period.
There should be a deadline set for this. To put it another way, a deadline should be set for finishing the job
within the necessary window of time (03 months). As a result, the project's timeline, from start to finish, is
as follows.

1.1 Finalizing the project 2022 May 20

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 45


2022 May 20
1.2 Getting the project proposal

2022 May 20
1.3 Topic finalising

2.1 Project management planning 2022 Jun 05

2.2 Research planning 2022 Jul 14

2.3. Analysis the question 2022 Jul 29

3.1 Cyber security issues 2022 Jul 07

3.2 Collecting the data 2022 Jul 12

3.3 Solution 2022 Jul 25

4.1 Project analysis 2022 Aug 04

4.2 Project report 2022 Aug 10

Gantt chart:

A Gantt chart is used in project management to show a project's process. The time required to finish each
sub-task for a certain project within a given time frame is depicted in a separate figure. In other words, by
describing the timeline created for the project, the project may be understood easily. The timeline of the
development is represented in the graph below. (2022, Asana.com)

It shows the duration of the job as a function of time graphically. Gantt charts are useful tools for
scheduling and planning projects. A Gantt chart shows the start and finish dates of the project as well as
other connections between project activities, allowing you to keep track of the tasks in relation to their
projected completion dates or defined milestones.
The time line's division is clearly seen in the preceding diagram. The three-month project is therefore split
into months. Here, each thesis topic is listed before the appropriate time period. The time spent on each

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 46


dementia-related topic is colored once it has been finished. Thus, the job may be completed successfully.
That implies that finishing the job will be simple.

Milestone Chart:

An effective technique to see the most crucial phases of your project is with a milestone chart. Each
milestone your team completes moves you one step closer to finishing your project; in this manner,
milestones provide your team a sense of success and demonstrate how their work supports the main goal of
the project.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 47


Not only are milestones crucial for your team, but they also make your job as the project manager easier.
To visualize the progress of your project and make sure everyone is on the same page, you may share your
milestone chart with other project stakeholders. (asana, 2022)

Figure 3 Milestone Chart

Task 02:

P4 Carry out small-scale research by applying qualitative and Quantitative research methods appropriate for
meeting project aims and objectives.

What is quantitative research and introduction of working remotely?

Through the collection of measurable data and the use of statistical, mathematical, or computer methods,
quantitative research is the systematic analysis of phenomena. Through the use of sampling techniques and
the distribution of online questionnaires, polls, and surveys, for instance, quantitative research gathers data
from current and future clients.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 48


Which may be represented numerically as the outcomes. A product or service's future may be predicted
using these data, and modifications can then be made as necessary.

Professionals can conduct their business outside of an office environment by working remotely. Since it is
based on the premise that work need not be done in a certain area to be effective, information technology is
presently among the most extensively utilized technologies in the field of communication. The challenges
that the nation's residents have experienced with COVID-19 and the acute fuel scarcity may be cited as the
primary reasons why the concept of remote employment has grown in favor among the general public.
(Open Who, 2022)
The expanding online infrastructure has increased the security dangers facing Sri Lanka's corporate sector.
The author has believed since the industry's start that the use of remote workers will raise security issues
for Sri Lanka's business sector. The author made the decision to look at conversation-specific cyber
security issues that pertain to distant work. An employee who is not in the workplace may not be reachable
by recent business acquaintances and partners. Given how quickly technology has advanced, several
companies have even abandoned their traditional headquarters. They must conduct their business
elsewhere since they have a huge workforce that is distributed around the nation.
Due to the absence of technological advancements, working remotely has been challenging in the methods
that have been practiced in the past. An employee who is sick or otherwise unable to work cannot
communicate with coworkers or business partners. You can be prompted for an extra phone number, pager
number, or fax number when contacting a number for business-related activities. Even fully remote
employment was not as widespread as it is now. Due to the rapid growth of technology, several firms have
even decided to abandon their conventional headquarters. Due to the size of their personnel, which is
distributed across the nation, they are forced to run their firm from many locations. (Open Who, 2022)

The implications of remote working for the LOLC PLC Company.

One year after it initially surfaced, the Covid-19 pandemic's effects on the financial services industry are
still being felt. Financial institutions were under pressure to change to the digital environment even before
the epidemic. The LOLC Corporation was also impacted by this worst-case scenario. This implies that the
workers are unable to travel to their workplace to do their tasks. Additionally, their clients were unable to

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 49


support their services. Additionally, there is a propensity towards remote employment because of this.
They can easily sustain their services to their consumers and the company's personnel may effortlessly
carry out their duties by working remotely. This circumstance has made remote employment quite
common.

Due to these circumstances, the Dialog firm also offered remote services to its clients, making it simpler to
give services to the business and its staff.
To stop any digital system from being hacked, you need cyber security. All of these factors are part of
cyber security. A complex information system is used to maintain it. Data breaches, identity theft, and
other cybercrimes may all be avoided with the correct cyber security measures in place. All of the above
stated expressions are related. Remote employment in the telecommunications sector can potentially be
impacted by cyber security. Thus, the idea of CIA Trade will have an impact on this. The initials "CIA
triad three" stand for accessibility, discretion, and reliability. These circumstances allowed the Dialog firm
to give services to its clients remotely as well, making it simpler to deliver services to the business and its
staff.
To stop any digital system from being hacked, cyber security is necessary. Each and every one of these
components is part of cyber security. It is kept up to date using an advanced information system. Data
breaches, identity theft, and other forms of cybercrime might all be prevented with the correct cyber
security measures in place. The above expressions are all related. In the telecommunications sector, remote
employment may also be impacted by cyber security. In other words, the idea of CIA Trade will have an
impact here. Availability, secrecy, and integrity are represented by the initials "CIA triad three".

Reliability of quantitative research method:

The reliability of the form could be a way to judge the quality of the measurement technique used to gather
data. A valid result requires a trustworthy measurement process in order to be considered. While
examining the structure of a research, choose a life. Questionnaires are one of the media used to measure
construct, the theoretical variable being measured. These surveys are a component of the measurement
process. As a result, this measurement process should provide an associate with the accurate representation

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 50


of the construct, which may then be regarded as stable or constant. For instance, if we wanted to live
intelligently, we would want to have a method for assessing intelligence that is precise.

Accuracy of quantitative research method:

Most surveys typically have what's referred to as face validity, which may be a matter of appearances. Do
the queries look like an affordable thanks to acquiring the knowledge we have a tendency to be trying to
find, however, are they really? There are alternative kinds of validity survey writers ought to attempt for.

 Content accuracy
 Internal accuracy
 External accuracy

Content accuracy:

This is related to our capacity to create queries that accurately reflect the problem we usually examine
while making sure that important related topics aren't left out. For instance, we may be interested in
learning how clients utilize hair style items and just bring up how they used them in the previous week. In
this instance, we appear to be missing information on product usage in diverse climates (given that
humidity will give you a bad hair day associate degree excessively quickly). As a result, we can come
away from this lesson with an inadequate picture of customer behavior.

Internal accuracy:

This asks whether or not the queries we tend to cause will very make a case for the end result we would
like to analysis. In our hair styling product example, we'd like to raise queries that facilitate the USA to
determine factors that influence the choice of hair styling product. Here we tend to area unit trying to find a
relationship between freelance variables (e.g., hair type, hairstyle, etc.) and therefore the variable (e.g.,
chance to shop for the hair styling products).

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 51


External accuracy:

This refers to the degree to which the survey sample's target population may be generalized from the
results. Everyone is aware that the way we ask questions might influence the answers we receive. To put it
another way, the questions should reflect how the target audience views the issue under study and how
they speak about it, which typically suggests the need for exploratory qualitative analysis. Assume for the
purposes of our example that we want to calculate the percentage of customers who choose our product
among the hairstyling product category. Otherwise, we won't be able to extrapolate the results to the class
as a whole. To do this, we'd like to include other brands that represent this class.

Methods of Qualitative Research:

A questionnaire is used to gather data as part of qualitative research. The participants in the study will get a
questionnaire there. Following the completion of a questionnaire, data pertaining to it will be gathered.
Getting the information in writing in this case is more effective. This is so because most sources of
information are reliable. This approach not only aids in understanding. It is employed to respond to
inquiries on the validity of connections with factors that may be assessed in order to explain, forecast, or
regulate an event. The techniques used in qualitative research are listed below.

 Online Surveys: The main goal of survey research is to understand a large population by using the
survey. The day of conducting surveys using a pen and paper is long past. Since they are
convenient and can be disseminated by email or internet, online surveys are currently a widely used
research tool. This strategy entails developing and implementing a survey with the most appropriate
survey questions.

 Questionnaire: In other words, it's feasible to gather accurate data with a questionnaire. Here , A
questionnaire is a type of research tool made up of a set of inquiries intended to elicit information
from the respondents.

Qualitative research methodology questions on my cyber security risks of working remotely:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 52


Research methodology refers to the precise procedures or techniques used to locate, select, organize, and
assess the information on a topic. The methodology section of a research report offers the reader the
opportunity to judge the study's overall reliability and validity.

Variables Questionnaire Items


Section 01 availability Issues 4
Section 02 confidentiality issues 4
Section 03 integrity issues 4
Section 04 remote working 4

Questionnaires:

1. Employee Information’s

I. Are You?
 Male
 Female
 Other

II. Age Category:


 18 – 25
 25 – 35
 35 – 45
 45 – 55

III. Education Level:


 O/L
 A/L
 Diploma
 HND

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 53


 Degree
 MSC

2. Confidentiality issues:

1. My login system requires a password to be entered.

 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

2. For my password, I didn't use any numbers, digits, or symbols:

 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

3. The self-set password to enter the system is encrypted:

 Totally Agree
 Agree
 Moderate

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 54


 Disagree
 Totally Disagree

4. signing in to the system via a fingerprint scanner:

 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

3. Integrity issues

I. After a power interruption, a new login is necessary:

 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

II. Users' actions have caused the system to slow down occasionally:

 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

III. Issues arise while login into the user interface repeatedly:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 55


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

IV. Using digital signature for the management of the company:

 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

4. Accessibility problems:

I. At any time, backups can be made.


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

II. I always have access to my user account.


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 56


III. Having difficulties logging back into the system following an unplanned power outage?
 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

IV. Database updates occur daily, weekly, and monthly.


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

5. Remote working experience

I. My mental health is enhanced by working remotely.


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

II. I have greater flexibility when I work from home.


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 57


III. My home office is a fantastic space for remote work.
 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

IV. Employee satisfaction rises as a result of remote employment.


 Totally Agree
 Agree
 Moderate
 Disagree
 Totally Disagree

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 58


Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 59
Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 60
Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 61
Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 62
Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 63
Correctness and reliability of the qualitative research methodology used in remote working study:

From the discussion above, it is clear that the study combining the quantitative paradigm with qualitative
research via validity and responsibility has altered our perspective of what responsibility and validity imply
in terms of quality. Within the qualitative paradigm, responsibility and validity are characterized as trait,
rigor, and quality. I Triangulation is therefore defined as "a validity technique where researchers strive for
convergence across many and completely distinct sources of information to construct themes or categories
in a very particular study" (source). Responsibility, validity, and triangulation must thus be revised as we
have seen in order to reflect the many ways in which truth is produced if they are to be meaningful analysis
terms, particularly from a qualitative purpose of reading.

Advantages of using Questionnaires

 Cost savings: An online questionnaire is significantly more cost-effective than one that is
presented in person, over the phone, or by mail since there are no labor costs, paper costs, printing
costs, phone costs, or postal costs to consider.

 Contact individuals right away: You may rapidly connect with your responders and get their
opinion by using a variety of distribution methods for your questionnaire, including emailing,
texting, posting a link to it on your website, and making it downloadable through a QR code.

 Scalability: Because of the internet, it is quick and easy to increase the audience for your online
survey and practically target people all over the world. You only need to offer them a link to your
questionnaire, which may be done automatically through an email sent as part of a lead nurturing or
customer onboarding campaign.

 Confidentiality of respondents: When compared to other methods, such as in-person and


telephone interviewing, the ability to guarantee respondent anonymity using an online questionnaire
is a huge advantage, especially when you're wanting to poll respondents on sensitive topics. When

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 64


respondents are anonymous, it instantly makes them feel more at ease and encourages them to
answer honestly, which is wonderful when you're attempting to gain a more accurate and honest
image of your subject of research, such as when you're surveying employees about your business
culture.

 Flexibility for respondents regarding when and where to finish their questionnaire: One
fantastic feature of an online survey is the flexibility for respondents regarding when and where to
complete it. Increased response rates may be achieved by giving respondents extra time to complete
your survey and even the option to start it and finish it later.

 Data accuracy: Online questionnaire answers are automatically inserted into spreadsheets,
databases, or other software packages, reducing the risk of human error and enabling automatic
validation of the data. This is in contrast to methods like face-to-face and over-the-phone
questionnaires that require the interviewer to process respondent answers.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 65


(P5) Analyze research data using appropriate tools and techniques.

The aforementioned qualitative and quantitative studies have been examined using the proper
methodology. The findings of the research are listed below.

Collected Employee Details:

1. What’s Your Gender?


First we collected some of their Privet information from the employees of the company. The results of the
collected information are shown below. Accordingly, we collected this information from 20 employees and
analyzed it.

Figure 4 Gender of employees (Google forms)

According to the above data, it appears that the representation of women in this institution is increasing and
it is 46.7%. Also, a percentage of 33.3% male representation is recorded.

2. What age range?


The next thing we will look at is the age range of the employees here. Accordingly, we analyzed the
information under several age groups. Below is the data collected by us from 20 employees here.

Figure 5 Age range (Google forms)

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 66


According to the above data, it appears that most of the employees working here are between the ages of
18-25 and 36-45. Next we find that the age group is between 26-35 years and the age group is between 45-
55 years.

3. What’s Your Education Level?


We wanted the data about the education level of the employees here. Therefore, we took their education
level from 20 employees as above. We have divided this mainly into 4 parts. Accordingly Diploma, HND,
BSC Degree, MSC. Below we have given you the data of the employees here.

Figure 6 Education Level (Google Forms)

According to the above information, it appears that most of the people working here have a BSC degree.
Also, the majority of the other people are those who are in an education level that is more work for a
diploma.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 67


Confidentiality Problems:
Then our team focused on the security level of employees’ computer system and its confidentiality.

1. My login system requires a password to be entered.


We collected the opinions of employees about entering a password when entering their system. There, their
agreement and opposition were examined and their information was recorded.

Figure 7 login system requires password

In this analysis, we find that 35.7% of people agree with this question in the middle and more.

2. There is no change in security when using a fingerprint scanner.


We asked whether adding a fingerprint scanner would change the security of the system. Accordingly, the
result is shown below.

Figure 8 using fingerprint scanner

As a result, 42.9% have expressed their opinion on this. And 29% will agree with this question.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 68


3. For my password, I didn't use any numbers, digits, or symbols.
Our team collected the opinions of 20 employees about their use of numbers and symbols for a strong
password.

About 35% have expressed their opinion against not using numbers and symbols for their password and
about 21% agree with this.

4. The self-set password to enter the system is encrypted

A moderate answer was given by the majority to the question that the self-set password to enter the system
is encrypted. And about 8% of people have expressed their opinion against this completely.

Conclusion:
In the analysis of Confidentiality Problems, our team found positive answers and looking at their answers
to these 4 questions, we can conclude that they are concerned about security and privacy. Also, they don't

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 69


understand about the new methods, most of them gave a moderate answer to this and 27% people agreed
with this, we can see that they prefer to use elf-set password.

Integrity issues

1. After a power interruption, a new login is necessary.


If there is a power failure, we asked if the password should be given to log in to the platform again. The
data is as follows.

For this, the employees here were of the opinion that it is mandatory to enter the system using the password
in case of power failure. It shows 42% agreement.

2. Users' actions have caused the system to slow down occasionally.


In our analysis from the employees here, we got the following result when asked whether the system is
intermittently slow due to user actions.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 70


45% said that the system slows down from time to time due to user actions. And 21% have expressed their
opinion against this statement.

3. Issues arise while login into the user interface repeatedly.

It is reported that 50% of the employees agree that there are problems during repeated login to the user
interface and about 14% people are against this statement.

4. Using digital signatures in business management

Another question we asked here, namely the question of using digital signatures in business management,
it was noted that 36% of the 20 employees we selected agreed with this statement.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 71


Conclusion:

When we ask about integrity issues, we can conclude that the password is required to access the system in
the event of a crash, and that the system is slowed down by the actions of users. Also, we can see in the
investigation from the employees that there are problems when accessing the user interface frequently, and
they are willing to use a digital signature.

Difficulties with accessibility

1. Backups are available whenever necessary.

As a solution to the question that backups should be available whenever needed, 35% of the employees
here have said that they definitely agree and 7.1% have said that they are against it.

2. I always have access to my user account.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 72


I always have access to my user account. We asked this question to the employees we work here and
recorded the answers and as shown above, 29% percent of them were against this statement.

3. Having problems logging back into the system following an unplanned power outage?

Having trouble getting back into the system after an unplanned power outage? 35% agreed and 35%
disagreed. And another 17% percentage said that they definitely agree with this.

4. Daily, weekly, and monthly updates are made to the company database.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 73


31% of employees are of the opinion that the company's database should be updated daily, weekly and
monthly, and about 21% of people are against this.

Conclusion:

Based on the answers we got in the above inquiry about difficulties with access, our team came to a certain
conclusion. Here we first see that employees do not want to access the system from any location. Also, it is
the opinion of the employees to store the backups in the data warehouse on a daily and weekly basis and
thus the data is safe. Accessing the system during a power outage is difficult and we find that to be one of
the problems here.

Data analysis:

Although there are several groups, organizations, and specialists that approach data analysis in various
ways, the majority of them may be condensed into a universal description. Data analysis is the process of
modifying, processing, and cleansing raw data in order to obtain useful, pertinent information that supports
commercial decision-making. The process offers helpful insights and data, frequently displayed in charts,
graphics, tables, and graphs, which lessen the risks associated with decision-making. (Simplilearn, 2022)

Every time we make a decision in our everyday lives, we may observe a simple illustration of data analysis
by assessing what has happened in the past or what will happen if we take that action. In its simplest form,
this process involves looking at the past or future and making a choice based on that analysis. (Simplilearn,
2022)

Data analysis methods:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 74


Data analysis techniques and procedures are two phrases that some experts interchangeably employ.
Sometimes individuals even include the previously mentioned "data analysis kinds" in the mix, which only
serves to muddle matters further! Here, we want to distinguish between the many types of data analysis
and their diverse applications. (Simplilearn, 2022)

Despite the fact that there are several data analysis techniques, they always fall into one of the two main
categories of qualitative analysis or quantitative analysis. (Simplilearn, 2022)

Analyzing qualitative data: Using words, symbols, images, and observations, this technique gathers data.
This approach does not employ statistics. The most typical qualitative techniques are:
Use content analysis to examine linguistic and behavioral data. (Simplilearn, 2022)
Working with information gleaned from surveys, interviews, and diaries requires narrative analysis.

Qualitative data analysis:

Qualitative data analysis is the process of collecting, examining, and interpreting qualitative data—non-
numeric, conceptual information, and user feedback—in order to spot themes and patterns, answer to
research questions, and determine what actions should be made to enhance a product or service (QDA). In
other words, qualitative data analysis is applicable to non-numerical data like written documents, audio
recordings, notes, and transcripts of interviews. Is the range of procedures and methods used to convert the
amassed qualitative data into a description, understanding, or interpretation of the people and situations
under examination? The basis of a qualitative data analysis is often an interpretive theory. (Simplilearn,
2022)

Qualitative data analysis is the process of collecting, examining, and interpreting qualitative data, such as
non-numeric, conceptual data, and user feedback, in order to spot trends and themes, respond to research
questions, and determine what actions should be taken to enhance a service or website (QDA). In other

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 75


words, qualitative data analysis is applicable to non-numerical data such as written documents, audio and
video recordings, photos, and interview transcripts. Is the range of stages and methods used to convert the
obtained qualitative data into a description, comprehension, or interpretation of the subjects and conditions
under research? Typically, the basis of a qualitative data analysis is an interpretive theory. This method of
qualitative data analysis starts by formulating a hypothesis and examining a single case. (Simplilearn,
2022)

Qualitative data analysis tools and techniques:

Qualitative research is difficult to predict and requires intensive cognitive processing. Finding thought and
opinion patterns via qualitative research is frequently done to explore further into issues. Both semi-
structured and unstructured data collection methods can be employed. Their website offers access to a

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 76


number of software programs, including NVivo, ATLAS.ti, and MAXQDA. Google searches on the
websites of these apps may be used to find out more about them, including how to obtain a free trial copy.
Better data is available. Manual instrument inspection data kinds categorized by topic. Organizing your
questionnaire's questions into categories based on themes that may be deduced from the study's goals and
questions is a smart approach. After all, the purpose of a research project is to provide answers to general
questions and accomplish specific objectives.

Below are some software:

 Text analysis is a method for identifying themes in texts that was developed for use in ethnographic
and discourse research. The researcher is also capable of decoding, extracting, and storing coded
data

 .One technique for conducting extensive qualitative data analysis is ATLAS. Complex features of
this tool help handling and organizing massive volumes of data simpler. Atlas supports a broad
variety of media formats, including txt, doc, docx, pdf, mp3, mp4, and avi.

 For mixed-methods, qualitative, and quantitative research projects, MAXQDA is complete


software. You are permitted to import, arrange, organize, analyze, display, and publish any forms of
data, provided that the data was collected electronically. is extensive software designed to support
and facilitate mixed-methods, qualitative, and quantitative research projects. You are permitted to
import, arrange, organize, analyze, display, and publish any forms of data, provided that the data
was collected electronically.

 Software for qualitative analysis called QDA - Miner makes document management and other
common qualitative analysis tasks easier. In other words, software for computer-assisted qualitative
data analysis offers tools to aid qualitative research, such as content analysis, iterative
summarization, grounded theory approach, coding and text interpretation, and transcription
analysis.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 77


 NVivo is a software used in both qualitative and mixed-methods research. is mainly used for the
analysis of unstructured data, including free text, audio, video, and picture data, including
interviews, focus groups, surveys, social media, and journal articles.

Quantitative data analysis:

Quantitative data analysis, though it seems complicated, basically refers to the analysis of data that is based
on numbers or that can be quickly "translated" into numbers without losing any value. (Gradcoach, 2022)

Gender, nationality, and native language, for instance, might all be "translated" into numbers without
losing their significance; for instance, English could equal 1, French 2, etc. (Gradcoach, 2022)

As I already said, statistical analysis techniques power quantitative analysis. Descriptive statistics and
inferential statistics are the two primary "branches" of statistical procedures that are employed. Depending
on what you're attempting to determine, you might solely utilize descriptive statistics in your study or you
might use a combination of both.

 Descriptive statistics
 Inferential Statistics

Descriptive statistics

 The mathematical average of a range of numbers is known as the "mean."


 When a range of numbers is organized in numerical order, the median represents the middle in the
range. The median is the value that falls exactly in the center of the data collection if it contains an
odd number. The median is the midway between the two middle values when the data set is even.
 The number that appears the most frequently across the data set is the mode.
 The standard deviation measure shows how evenly distributed a set of numbers is. To put it another
way, how closely all the data point to the mean (the average).

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 78


 Skewness - Skewness, as its name suggests, reveals how symmetrical a set of numbers is. In other
words, do they tend to skew to the left or right, or do they prefer to cluster into a smooth bell curve
form in the center of the graph?

Figure 9 Descriptive statistics

Inferential Statistics:

As I previously stated, inferential statistics seek to draw conclusions about the population, whereas
descriptive statistics are all about the specifics of your particular data set, or sample. To put it another way,
you'll utilize inferential statistics to forecast what you'd anticipate finding in the entire population.

What sort of forecasts, I hear you ask? Using inferential statistics, researchers frequently try to make two
different kinds of predictions:

First, assumptions regarding group differences, such as height disparities between kids classified by
favorite foods or gender.
Second, correlations between variables, such as those between body weight and the quantity of yoga
practiced each week. To put it another way, when used correctly, inferential statistics let you draw
conclusions and anticipate what will happen in the general population based on what you see in your

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 79


sample data. To evaluate hypotheses that assert changes or differences, inferential statistics are thus
employed in hypothesis testing.

Figure 10 Inferential Statistics:

The tools and procedures that will be utilized to analyze the information collected from the survey
questionnaire are listed below:

Charts, maps, and diagrams are devices used for gathering, analyzing, and displaying quantitative data for
a range of purposes and industries. Numerous programs and methods have been created for use in nearly
every industry, from research groups and data collection companies through manufacturing and quality
control. Although you'll need to learn how to utilize the data and understand the results, statistical analysis
tools can help to make the process as easy and straightforward as possible. Here is a summary of some of
the tools you may use to do statistical analysis on your data.

 A popular general-purpose statistical tool for editing, analyzing, and displaying data is SPSS
Software.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 80


In academic research, numbers. All frequently used file types for storing structured data, including
relational (SQL) databases, Excel, and plain text files, are compatible with it. The data from the project's
questionnaire submission is analyzed using this program. Through the use of this program, it was feasible
to draw a conclusion from the analysis of the plot's data. Therefore, the events are summed up as follows.
This was prepared using the SPSS software. The case summary approach, then, computes subgroup
statistics for variables inside categories of one or more grouping variables. The grouping variable is cross-
sectional at each level. Additionally, each variable's total summary data is shown. The data values for each
category can be published or concealed. Here, LOLC Company is required to identify potential cyber
security issues caused by remote work and provide fixes. The LOLC firm created a questionnaire and
sought answers in order to ascertain the organization's security problems. The data is subsequently
analyzed using software. The case handling, as judged by looking at the response provided, is summarized
below.

Case Processing Summary

N %

Cases Valid 20 100.0

Excluded 0 .0

Total 20 100.0

a. List wise deletion based on all variables in the procedure.

Reliability statistics:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 81


Reliability in statistics refers to a measure's consistency. Are the measurements accurate if you repeatedly
measure the same thing? A measure with high dependability is more consistent than one with poor
reliability.

A measurement might be correct yet unreliable. In other words, reliable measurements can be made, but
you may not be measuring what you believe you are. A metric that is trustworthy and valid is the ideal.

Issues with confidentiality:

The first four inquiries on the form might be referred to as the four hidden inquiries. The dependability of
the results of the analysis of the data collected for these questions is as follows.

Reliability Statistics

Cornbrash’s Alpha N of Items


.693 4

Here, the first four questions' dependability was evaluated. As a result, the dependability score for the
aforementioned table is 0.693. As a result, after assessing the secret data in the above table, Cornbrash’s
alpha value is more than 0.6, indicating that the data is credible. The company's employees all responded
the same to these four questions as a consequence. In other words, the response was provided accurately.

Integrity problems:

Four of the continuity questions in this passage are references to the following four questions. The
dependability was determined by examining the information that was provided for these four questions.

Reliability Statistics

Cornbrash’s Alpha N of Items

.791 4

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 82


The trustworthy value of continuity data analysis is indicated in this table at 0.791. Therefore, continuous
data is credible when analyzed since Cornbrash’s alpha is greater than 0.6. In other words, the four
questions have been satisfactorily answered.

Accessibility problems:

The author has here linked the third four queries to four availability-related questions. Following are the
results of a reliable analysis of the data collected for these four questions.

Reliability Statistics
Cornbrash’s Alpha N of Items

.804 4

The dependability value is displayed as 0.804 in the study of Availability concerns in this table. Therefore,
Cornbrash’s alpha value is larger than 0.6 when examining continuous data, indicating the reliability of the
availability issues. In other words, the four questions have been satisfactorily answered.

Correlation Analysis:

A statistical technique used in research to determine the link between two variables and gauge the strength
of their linear relationship is correlation analysis. The magnitude of change in one variable as a result of
the change in the other is determined using correlation analysis, to put it simply. A high correlation
indicates a strong association between the two variables, whilst a low correlation indicates a poor
correlation between the two variables.

Problems with confidentiality when working remotely:

The privacy issues with remote work are listed in the table Follow. In other words, this measures
correlations. In this case, a negative (-) correlation coefficient denotes an opposing change in the two
variables. The correlation coefficient in this case is -.189. This suggests that there is no positive correlation

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 83


between these two factors. Working remotely in this situation is made simpler by less privacy concerns.
This indicates a reduction in the experience of working remotely and an increase in privacy concerns. As a
result, the Pearson correlation coefficient value indicates that there is only a very weak negative link
between privacy concerns and remote work experience characteristics. In other words, it has been
discovered that there is a substantial negative linear association between factors relating to privacy concern
and distant functioning. In this instance, (+) raises both sides whereas (-) increases

Correlations
CI RWE

CI Pearson Correlation 1 -.189

Sig. (2-tailed) .425

N 20 20

RWE Pearson Correlation -.189 1

Sig. (2-tailed) .425

N 20 20

Integrity problems with remote working:

The links between integrity concerns and remote work experience are displayed below in the second table.
In light of this, a negative (-) correlation coefficient denotes an opposing change in the two variables. The
correlation coefficient between and here is -.424 This suggests that there is a bad correlation between the
variables. As a result, there will be more problems with continuity and less benefits of working remotely.
As a result, the Pearson correlation coefficient value indicates that there is very little link between integrity
difficulties and distant work experience characteristics. According to the Pearson correlation coefficient
value, there is a significant positive linear association between integrity difficulties and remote working.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 84


Problems with availability when working remotely:

The two variables move in the same direction when the correlation coefficient is larger than 0. It is -381 for
the correlation coefficient. This shows a favorable correlation between the two variables. This suggests that
there is no positive correlation between the two variables. It indicates a rise in availability concerns and a
decline in the remote working environment. The connection's strength is poor. Thus, a substantial positive
linear association between Integrity concerns and characteristics of remote working is indicated by the
Pearson correlation coefficient value.

Correlations
II RWE

II Pearson Correlation 1 -.424

Sig. (2-tailed) .062

N 20 20

RWE Pearson Correlation -.424 1

Sig. (2-tailed) .062

N 20 20

Descriptive statistics:

Descriptive statistics both describe the "center" or anticipated value of a variable's central tendency and
dispersion (the response distribution of the variable). Even when measures of central tendency and
dispersion are improper, SPSS nevertheless runs statistics. Below are the descriptive data that came from
an examination of the concerns related to confidentiality, integrity, availability, and remote working
experience.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 85


Confidentiality issues:

Here, the first question's lowest and maximum ranges are 4.0 and 5, respectively. Its standard deviation's
mean value is 3.650. The majority of people have responded in a neutral manner. The lowest range for the
second question is 3.0, the maximum range is 5, and the mean standard deviation is 4.9. In the third
question, the lowest and greatest ranges are 3.0 and 5.0, respectively, with a mean standard deviation of
3.900. The lowest and highest ranges in the fourth question are 2.10 and 2.90, respectively. Here, the
standard deviation's mean value is 1.800.
The aforementioned statistics are descriptive and are examined for confidentiality. Data was collected from
20 individuals for anonymity purposes, and after analysis, it was determined that the lowest range is 2.70
and the greatest range number is 3.50. As a result, the standard deviation's mean value is shown as 3.204.
In other words, this number is 3 times 3. Here, "not taken" is mapped to the number three on a Likert scale.
and this is in reference to the common response. That is, no decision has been made about the
questionnaire's response. That is, maintaining one's position or remaining neutral. A standard deviation can
have a value between 0 and infinity. A list of numbers with a standard deviation of 0 are all the same. In
light of this, the deviation is 0.209.

Descriptive Statistics
N Minimum Maximum Mean Std. Deviation

I use a password to enter my 20 4.00 5.00 3.6500 .58714


login system.

I have used numbers, digits 20 3.00 5.00 4.9000 .91191


and symbols for my
password.
Using a fingerprint machine 20 3.00 5.00 3.9000 .55251
improve the security.

The self-set password to 20 2.10 2.90 1.8000 .83351


enter the system is encrypted

Valid N (listwise) 20

CI 20 2.70 3.50 3.2040 .20913

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 86


Integrity problems:

The lowest range in this first question is 3.0, and the maximum range is 5. Its standard deviation's mean
value is 3.800. The majority of people have responded in a neutral manner. In the second question, the
minimum and maximum ranges are 1.0 and 4, respectively, with a mean standard deviation of 1.950. The
third question's ranges are as follows: 1.0 for the lowest, 3.0 for the highest, and a mean standard deviation
of 2.200. The lowest and maximum ranges in the fourth question are 1.0 and 5.0, respectively. Here, the
standard deviation's mean value is 2.250.
The aforementioned descriptive statistics are checked for integrity problems. Here, data for Integrity was
collected from 20 participants, and after analysis, it was determined that the lowest range is 2.80 and the
greatest range value is 3.40. As a result, 3.248 is displayed as the mean value of the standard deviation. In
other words, this number is 3 times 3. The lowest range in the third question is 1.0, the greatest range is
3.0, and the mean standard deviation is 2.200. The lowest range in the fourth question is 1.0, while the
greatest range is 5.0. The standard deviation in this instance is 2.250 on average.
These descriptive statistics are examined for integrity problems. 20 persons provided the data for Integrity
in this instance, and after analysis, it was determined that the lowest range is 2.80 and the greatest range
number is 3.40. As a result, the standard deviation's mean value is shown as 3.248. In other words, this
amount is equivalent to 3.

Descriptive Statistics
N Minimum Maximum Mean Std. Deviation

Backups can be taken 20 1.00 4.00 1.9000 .78807


whenever needed.

I can access my user account 20 2.00 5.00 2.5500 .94451


at any time.

Having trouble re-entering the 20 1.00 3.00 2.0000 .72548


system after an unexpected
power outage?

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 87


Company database is updated 20 1.00 5.00 2.0500 .88704
daily, weekly and monthly.

Valid N (listwise) 20

AI 20 3.20 3.80 3.3280 .15144

Accessibility problems:

Here, the first question's lowest and maximum ranges are 1.0 and 4, respectively. Its standard deviation's
mean value is 1.900. In the second question, the lowest and greatest ranges are 2.0 and 5.0, respectively,
with a mean standard deviation of 2.550. The third question's ranges are as follows: 1.0 for the lowest, 3.0
for the highest, and 2.000 for the mean. The lowest and maximum ranges in the fourth question are 1.0 and
5.0, respectively. Here, the standard deviation's mean value is 2.050.
Here, the lowest range in the first question is 1.0, and the greatest range is 4. Its standard deviation is 1.900
on average. The lowest range in the second question is 2.0, the greatest range is 5.0, and the mean standard
deviation is 2.550. The lowest range in the third question is 1.0, the maximum range is 3.0, and the mean
standard deviation is 2.000. The lowest range in the fourth question is 1.0, while the greatest range is 5.0.
The standard deviation in this instance is 2.050 on average.

Descriptive Statistics
N Minimum Maximum Mean Std. Deviation

Backups can be taken 20 1.00 4.00 1.9000 .78807


whenever needed.

I can access my user account 20 2.00 5.00 2.5500 .94451


at any time.

Having trouble re-entering the 20 1.00 3.00 2.0000 .72548


system after an unexpected
power outage?

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 88


Company database is updated 20 1.00 5.00 2.0500 .88704
daily, weekly and monthly.

Valid N (listwise) 20

AI 20 3.20 3.80 3.3280 .15144

Conclusion:

Here, 20 persons have provided information in response to inquiries about confidentiality. This falls
between 2.70 and 3.50. From narrow range to big range, in other words. The average here is 3.204. This
indicates that the LOLC Company personnel are ignorant of these problems and their solutions. As a result,
participants did not decide on the LOLC Company’s confidentially. Therefore, a negative (-) correlation
coefficient denotes an opposing change in the two variables. The correlation coefficient in this case is -
.189. Here, 20 persons have provided information in response to inquiries about confidentiality. This falls
between 2.70 and 3.50. From narrow range to big range, in other words. The average here is 3.204. This
indicates that the LOLC Company personnel are ignorant of these problems and their solutions. As a result,
participants did not decide on the LOLC Company’s confidentially. Therefore, a negative (-) correlation
coefficient denotes an opposing change in the two variables. The correlation coefficient in this case is -
.189. In other words, there is a negative correlation between the two variables. It indicates a rise in privacy
issues and a decline in the benefits of working remotely. Here, the Pearson correlation coefficient value
reveals a very slender negative association between factors related to privacy concerns and remote work
experience. As a result, LOLC may operate remotely, allaying privacy worries.

The author was able to reach a conclusion after analyzing integrity-related problems. In other words, 20
individuals have responded to these integrity-related queries. The range in this case is 2.80 to 3.40. Here,
3.248 is the mean value. The company's employees generally cite it as the most noteworthy response. The
author was able to pinpoint the company's integrity problems in this situation. Correlations in this case are
-.424. as a result, the opposite side is (-) when one side is (-). As a result, Dialog Company is able to
function remotely by minimizing integrity problems.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 89


Twenty employees of the LOLC Company have provided information on the availability challenges. It
varies from 3.20 to 3.80, with a mean of 3.328. An opposing change in the two variables is indicated by a
negative (-) correlation coefficient in this situation. The correlation coefficient is -.381. This implies that
there is no connection between the two variables that is positive. It shows a surge in availability worries
and a reduction in the environment for remote work. The strength of the link is weak. Therefore, a weakly
negative link between the variables of current difficulties and remote work experience is shown by the
Pearson correlation coefficient value. Here, LOLC can improve remote working by allaying fears about
availability.
The author can come to a conclusion by examining the facts they have collected. In other words, the author
has pointed up the problems with availability, integrity, and secrecy at LOLC Company. The author's list
of security flaws is provided below.
The author has once again recognized passwords as a privacy concern. That is, refraining from inputting
the password, changing it three times every month, and not utilizing letters, numbers, or symbols.
Regarding the integrity issue, the author has seen frequent system crashes and system slowness. Employees
find it difficult to complete their task as a result. The extra user interface has persistent access issues,
according to the author. The author identified accessibility difficulties with things like the system's backup
not being stopped and the system's database not being updated daily, weekly, and monthly.
These problems lead to cyber security problems and make the company's data vulnerable. Apart from this,
working remotely is convenient for both the employer and the employee and does not improve production
and efficiency. In addition, issues like a shift in employee mindset manifest themselves. Remote
employment comes both benefits and drawbacks. Dialog may, however, operate remotely to get beyond
the business's cyber security concerns.
The author has already addressed the problems of remote working with Dialog and cyber security. In this
case, the LOLC Corporation should be informed of the problems and offered remedies, allowing the
management to make a decision.

(P6)Describe appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions

The following recommendations are applicable based on the aforementioned qualitative and quantitative
study results and analyses for LOLC Company project planning success:

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 90


Using confidentiality issues brought on by remote working to identify cyber security problems:

 Recommendation:
According to our analysis, even though the employees were given moderate opinions about the use of a
fingerprint scanner when entering the system, it is seen that they have no idea about it. Therefore, in cyber
security, security should be provided so that no other external party can access its system. We concluded
that they should be informed about that.

It is also important to use numbers and symbols to further strengthen your passwords. Employee passwords
can also be changed once in a certain period of time.

According to the inquiry from the employees, there is more preference to use self-generated password, so
we can create very strong passwords by giving the employees of the company to use a system-generated
password. Therefore, the impact on cyber security is reduced.

Using integrity issues brought on by remote working to identify cyber security problems:

 Recommendation:
When talking about integrity issues, we came to some recommendations with our analysis. Here, due to the
system slow caused by the traffic in the company's system, cyber security may be disturbed in some way.
Therefore, the weakness of the system should be updated.
Also, in the event of an emergency power outage, you must enter the password to access the system again.
There should also be a shift to a digital signature system to verify the identity of employees, thereby
helping cyber security.

Using availability issues brought on by remote working to identify cyber security problems:

 Recommendation:
These days, in Sri Lanka's power outages, workers who work from their homes are affected. In the event of
a sudden power outage, there is a possibility that one's work will be lost. To prevent it, the system should

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 91


be set up to store an information backup from time to time, and one of the benefits of keeping a backup is
that if the system is hacked, we can keep the company's information safe.
Also, in the event of a sudden power failure, passwords should be entered to access the system and the
efficiency of the system should be increased. This will minimize the cyber security impact.

Action Plan:
An action plan is described as a document or checklist that lists the activities or duties that must be carried
out in order to accomplish the goals that have been established.
An action plan, which is a component of strategic planning, is essential to project management because it
enables teams to work together efficiently, communicate clearly, and complete a project from beginning to
end. (Bit Tech, 2022)

Action Plan
The issues in the Method of securing work-finishing day The person
company the issues responsible for the
work
1. Working The amount of time 25 / 09 / 2022 Mr. Achala Gamage
remotely can harm remote workers (Manager of LOLC
people's mental spend at work has to company)
health. be reduced.
2. Remote working Employers must 18 / 09 / 2022 Mr. AcHala Gamage
doesn't increase encourage people to (Manager of LOLC
employee work physically. company)
productivity and
efficiency.
3. Not updating the Daily, weekly and 08 / 09 / 2022 Mr. Achala Gamage
database daily, monthly database (IT manager of
weekly and updates. LOLC company)
monthly.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 92


4. Frequent user Being able to save 26 / 08 / 2022 Mr. Achala Gamage
interface visits the username in the (IT manager of
system. LOLC company)
5. Not updating the Every employee 21 / 07 / 2022 Mr. Achala Gamage
system password must update his old (IT manager of
once in three password to a new LOLC company)
months. password once in
three months.
6. Do not use Password must 05 / 08 / 2022 Mr. Achala Gamage
numbers, digits and contain numbers, (IT manager of
symbols for the digits and symbols LOLC company)
password and make and must be at least
the password small. 8 characters long.
7. Frequent user Being able to save 15 / 08 / 2022 Mr. Achala Gamage
interface visits the username in the (IT manager of
system. LOLC company)

8. System crashes Delete unnecessary 10 / 08 / 2022 Mr. Achala Gamage


and slows down data and clean the (IT manager of
frequently. system. Increase LOLC company)
memory capacity.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 93


TASK 04

(P7)Provide a reflection on the value of undertaking the research to meet stated objectives with your
own learning and performance which includes a discussion of the project outcomes, its usefulness to
support sustainability of the given organization and its’ performance

The LOLC Company's aforementioned quantitative and qualitative study is the most beneficial for making
this project successful since these two studies aid in identifying cyber security risks associated with remote
working and helping to discover solutions to those risks. Employees must work from home due to the
present scenario, as it is the primary emphasis of the LOLC firm. Research plays a critical function in the
global commercial sector for giving the project meaning and making it practicable. By displaying the
project start and duration time required to complete the project, the Gantt chart aids LOLC Company.
The critical route, which displays the anticipated project completion days, may also be discovered using
the network diagram. Although any project requires time and money to complete, with the right planning,
it can be completed efficiently and on schedule. I was able to complete this assignment by applying my
knowledge from my research and the research method to all of its criteria. Additionally, I discovered that I
was successful in handling data collecting to determine the precise study findings. I also identified the best
course of action for better resolving all pertinent project sectors. I did, however, find it challenging and
challenging to write such a long research project because it was my first time to conduct and complete a
research project. Additionally, I found that data collecting was difficult since it took a lot of time and effort
to get the necessary data to determine the results. My project was well-organized and information-rich
since my instructor had helped me with the project's framework and structure. It served as a reminder to
me that I need to sharpen my research writing abilities in order to succeed at the project's content and
effectively complete the research criteria.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 94


(M4)Evaluate the value of the project management process and use of quality research to meet stated
objectives and support own learning and performance

Learnings and performances of the project manager:

 Communication skills: I have acquired communication skills via my work as a project manager at
LOLC Company and have applied them to the project. I was in contact with several parties,
including staff members, material suppliers, technicians, and so on.
 Leadership skills: I had to oversee all project operations as the project manager for LOLC
Company, which was crucial for my education and helped me perform better.
 Team management skills: I've learned a valuable lesson about teamwork, and I consider it crucial
to my effectiveness. The LOLC Company project was successfully completed thanks to the efforts
of the team management.
 Negotiation skills: I had to discuss the project with a huge number of delegates and other
stakeholders while operating it. I now understand how to handle the stakeholders and negotiate
favorable terms with the clients. I can learn a lot from this.
 Risk management skills: Every computer project has a certain amount of risk, hence the project
management must possess some capability of controlling risk. So as a researcher for the LOLC
Company, I've learned a few things about managing project risks, and having this characteristic has
enabled me to complete the project effectively and to reach the project's goal.
 Cost control: As a researcher for the LOLC Company, I have acquired knowledge of the
procedures for project cost management. The most crucial aspect of a project is control, and I am
quite knowledgeable about how to control a project's costs.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 95


(D2) the decision-making process and changes or developments of the initial project management plan
to support justification of recommendations and learning during the project

The production of in-depth and pertinent suggestions as well as learning during the project may be
influenced by the project management process, the Project Outcomes, the decision-making process, and
modifications or developments of the project management plan. Planning is actually one of the key aspects
that has helped me complete this project and reach my goals. In order to accomplish the objectives and
goals, it helps me to create a consistent route to seek the project results. It is important to note that a
detailed strategy will likely aid me in outlining what must be done first to save time and effort and better
complete the job. Additionally, after finishing this study, I recognized that strong time management is the
key to my ability to conduct and finish a regular research assignment better and more successfully. It
allowed me the opportunity to outline the whole content of my project in a certain amount of time and
empowered me to avoid wasting too much time on a chapter in order to concentrate on the project's key
components. My lecturer's help also contributes to the results of academic success and personal growth. In
actuality, my professor did encourage me in moving in the right way for the study by assisting me in
realizing the areas of my project's weakness. In addition, the instructor helped me pick the topic that would
yield the best academic research results and motivated me to do so. Additionally, it appears that the
project's learning and suggestions are shaped by the decision-making involved in project management. In
actuality, decision-making aids in monitoring and controlling project implementation, presenting some
essential adjustments to drive project execution to fulfill the objectives, delivering the appropriate
recommendations, and aiding in project learning (Bruce, Pope and Stain street, 2008). Furthermore,
because the project initially failed to proceed in the appropriate methods to determine the findings of the
questionnaire, decision-making also aids in resolving planning issues. Basically, the modifications and
advancements made to this project management plan have been noted in order to show how they support
the researcher in addressing the research's shortcomings and assisting in meeting high standards for project
results and performance. Additionally, it enables tightening project management controls to better manage
project results and make them more dependable and effective.

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 96


References

Anon., 2022. forecast. [Online]


Available at: https://www.forecast.app/blog/what-is-project-quality-management
[Accessed 2022].
Anon., 2022. Gable. [Online]
Available at: https://www.gable.to/blog/post/remote-work-vs-work-from-home-all-you-need-to-know
Asana, 2022. [Online]
Available at: https://asana.com/resources/risk-register
asana, 2022. asana. [Online]
Available at: https://asana.com/resources/milestone-chart
[Accessed 2022].
awwawer, n.d. awwawer. [Online]
Available at: https://awware.co/blog/communication-plan/
[Accessed 2022].
Bit Tech, 2022. [Online]
Available at: https://blog.bit.ai/action-plan/

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 97


Gradcoach, 2022. [Online]
Available at: https://gradcoach.com/quantitative-data-analysis-methods/
LOLC, 2022. LOLC. [Online]
Available at: https://www.lolc.com/about
[Accessed 2022].
projectManager, 2022. Project Manger. [Online]
Available at: https://www.projectmanager.com/blog/triple-constraint-project-management-time-scope-cost
[Accessed 2022].
Simplilearn, 2022. [Online]
Available at: https://www.simplilearn.com/data-analysis-methods-process-types-article
techTarget, 2021. project scope. [Online]
Available at: https://www.techtarget.com/searchcio/definition/project-
scope#:~:text=Project%20scope%20is%20the%20part,statement%20or%20terms%20of%20reference.
[Accessed 22 09 2022].

Aziel Hewawitharana Managing a Successful Computing Project – Unit 06 98

You might also like