Professional Documents
Culture Documents
Amali Tharika
Assessor Internal Verifier
Unit 06: Managing a Successful Computing Project
Unit(s)
Managing a Project on cyber security risks due to Remote working
Assignment title
Aziel Hewawitharana
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals – Summative Assignment Feedback Form
LO1.Establish project aims, objectives and time frames based on the chosen theme
LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction P7 M4 D3
Descripts
Resubmission Feedback:
Action Plan
Summative feedback
Assessor Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
azielhewawitharana@gmai.com 2022/10/15
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Assignment Brief
Student Name /ID Number Aziel Hewawitharana
Issue Date
Submission Date
Submission Format:
Please note that this is an individual assessment and your report should include evidences to that you have
conducted a research to collect relevant data individually.
LO1 Establish project aims, objectives and timeframes based on the chosen theme.
LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.
LO3 Present the project and communicate appropriate recommendations based on meaningful
conclusions drawn from the evidence findings and/or analysis.
LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.
Research Topic: What are the key cyber security risks of working remotely e.g. employees
downloading unsecure apps or sharing their work devices with family members?
“The option to work remotely was already being embraced by some businesses in the pre-pandemic era.
These businesses were making some progress to adapt their working practices to accommodate remote
working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or
two a week. However, on the whole there had been a reluctance to have staff working remotely and this
has largely centred around productivity concerns, security implications and technology issues.
The global pandemic however necessitated and accelerated the move to remote working. The vast majority
of businesses have now shifted some or all of their operations online, and almost all of their staff are
working from home. The enabling force behind this necessary shift has been the different technologies
and platforms that facilitate workers to achieve business goals remotely. This sudden shift to remote
working took place within weeks and months and has not been without issues. Several surveys conducted
during this period cited business leaders complaining about how technology problems have impacted
their business and employees while working remotely. The biggest issues remote workers face are being
frequently disconnected from corporate networks, slow file downloads, poor quality of video meetings and
long response times when loading apps. As a result, building secure, effective and integrated technology
capability, to continue this flexibility in the workforce, has now become a priority for all organisations”.
(Pearson, 2020)
You are expected to carry out a small-scale research in order to explore the cyber security risks of
working remotely due to the pandemic, from the standpoint of a computing professional. The
research that you carry out can be based on an organization that you have access to gather sufficient
information to investigate the cyber security risks of remote working.
TASK – 01
1.1 Define the scope of the project and devise aims and objectives of the project that you are going to
carry out. You also should include a brief introduction to the selected company, remote working
process and technologies used, explanation to the project and other relevant information about the
research.
TASK – 02
Carry out a research to investigate the cyber security risks of remote working by applying appropriate
qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and
the appropriateness of the research methods applied. your answer also should include a critical
evaluation of the project management process and a justification to the selected research methodologies.
TASK – 03
TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own learning experience
gained through following a quality research and the project management process. Critically evaluate
the ways in which the research project carried out supports the organization to sustain its
performance/ security in a remote working environment and how the project supported you to
improve your own learning and performance.
Although working remotely is handy, it's possible for remote workers to unwittingly endanger the networks
and data of your business. Data breaches, unattended computers, and unsecured Wi-Fi connections are just
a few of the possible drawbacks a corporation can encounter. A remote worker with less technological
knowledge might make your business more susceptible to cyber-attacks.
While it is practical and has many advantages, working remotely also exposes businesses and people to a
number of cyber security threats and vulnerabilities. Companies must seriously address remote cyber
security for their remote personnel in today's online-first society.
Even businesses with the finest security procedures and cyber security policies can fall victim to inventive
and persistent hackers. They are always searching for weaknesses in tech stacks and remote working
scenarios. And a research claims that they're succeeding, with 66% of U.K. organizations and 57% of
businesses worldwide reporting successful phishing attempts in 2017.
What Are the Most Common Security Risks for Remote Work? ..................................................... 28
1.2 (M1) Produce a comprehensive project management plan, the plan should include milestone
schedule and project schedule for monitoring and completing the aims and objectives of the
project (P2) that includes cost, scope, time, quality, communication, and risk and resources
management. ...........................................................................................................29
Project Timeframe (Start date and end date of the project): ................................................................ 32
RACI Matrix............................................................................................................................................... 40
(P3) Produce a work breakdown structure and a Gantt chart to provide timeframes and stages
for completion: .......................................................................................................... 43
Milestone Chart:......................................................................................................................................... 47
P4 Carry out small-scale research by applying qualitative and Quantitative research methods
appropriate for meeting project aims and objectives. .............................................. 48
The implications of remote working for the LOLC PLC Company. .................................................... 49
Qualitative research methodology questions on my cyber security risks of working remotely: ........ 52
Questionnaires:....................................................................................................................................... 53
Correctness and reliability of the qualitative research methodology used in remote working study:
...................................................................................................................................................................... 64
(P5) Analyze research data using appropriate tools and techniques. ...................... 66
The tools and procedures that will be utilized to analyze the information collected from the survey
questionnaire are listed below: ................................................................................................................. 80
Conclusion: ................................................................................................................................................. 89
Using confidentiality issues brought on by remote working to identify cyber security problems: 91
Using integrity issues brought on by remote working to identify cyber security problems: .......... 91
Using availability issues brought on by remote working to identify cyber security problems: ...... 91
TASK 04 .................................................................................................................... 94
(P7)Provide a reflection on the value of undertaking the research to meet stated objectives with
your own learning and performance which includes a discussion of the project outcomes, its
usefulness to support sustainability of the given organization and its’ performance94
(M4)Evaluate the value of the project management process and use of quality research to meet
stated objectives and support own learning and performance .................................95
References ................................................................................................................. 97
Task 01:
Having a distinct identity of its own, LOLC Financing PLC is a leading regulated finance firm in Sri
Lanka. As one of the LOLC Group's cornerstone companies, we have stayed committed to closing the
accomplishment gap by providing unwavering quality, complete client satisfaction, and unmatched
financial competence.
Through strategic partnerships and audacious strategies, LOLC Finance, which started with Sri Lanka's
pioneering portfolio of financing solutions, has developed into a beacon of mass empowerment. Its
services are available to high-level corporate executives, small and medium-sized businesses, and
entrepreneurs at the grassroots level. The company's expansion and diversification have allowed it to
expand into industries including Islamic Finance, Auto and SME Finance, Working Capital, and Foreign
Currency Business, while yet maintaining the flexibility to take advantage of new chances for success,
wealth, and growth. (LOLC, 2022)
A work style known as remote work does not require the employee to be present in a physical office.
Therefore, remote workers do their business from wherever location they see fit. Companies can recruit
remote workers in their neighborhood, their nation, or elsewhere in the globe.
The rise in remote work over the previous few years will only be amplified by the Covid-19 epidemic in
2020. Technology advancements and perspective changes in management and human resources have made
remote work conceivable. Remote businesses place a high value on written communication,
documentation, team support processes, and a focus on results. Output has seen the most change in the
relationships between companies and employees as a result of remote employment. Managers track the
tasks and KPIs assigned to each employee rather than the number of hours they sat in a chair. (Anon.,
2022)
Remote work is the practice of an employee working outside of the main office of the company. Such
locations might include a worker's home, a co-working space, another public space, a private office, or any
other location besides the usual corporate office building or campus. That required LOLC firm workers to
work remotely as well. Employee stress can be lessened, and less time and effort will be required. The
business will gain from this. In other words, the company's products and services, like power, might
depreciate less quickly. Numerous businesses in Sri Lanka and across the world had made arrangements to
work remotely as a result of the Covid-19 issue.
The popularity of remote work increased as technology advanced. For the business, the staff, and their
customers, remote working has simplified numerous duties. Customers may now access their services from
anywhere. Working at a distance has benefits and drawbacks. That instance, when working remotely, there
were several data security difficulties. What are the benefits and drawbacks of working remotely?
Advantages:
A better work-life balance is possible while working from home:
Even a few decades ago, working remotely would have been almost impossible for many firms. An
employee had to travel to the workplace to complete their task before there was the appropriate
technology. The drawback of these technical developments? between job and family life are muddled. As a
result, a lot of workers place a high priority on maintaining a healthy work-life balance. The secret to
feeling happier and more productive at work has been the capacity to strike a balance between these two
worlds. Employees can achieve a better work-life balance and add hours to their days by saving the time
they would have spent on a lengthy commute.
Having fewer employees in the office also reduces costs for a business. How? Imagine a traditional office
space. Do you see a thriving, energetic work center, or are you imagining some of the desks sitting empty,
waiting to be filled with next year’s hires? That ghost town effect is real—and could be costing your
company thousands in wasted spending. With fewer people in the office, companies can condense their
real estate footprint, allowing for more efficient workspace usage.
Disadvantages:
Feelings of loneliness:
Whether we're talking about workers or bosses, we're all social beings who need one another to survive.
One of the main causes of sadness and poor productivity is isolation.
Be careful to avoid feeling lonely while working remotely, either for yourself as a remote worker or for
your remote employees if you are an employer. To avoid feeling lonely while working remotely, keep in
mind the following key points:
Work from home and in the office together
When talking online, use a camera.
Use conventional methods of communication, like the phone.
Plan (virtual) get-togethers, team-building activities, etc.
when you first arrive at work, check in
Keep anniversaries in mind, and organize casual office gatherings
It could be more difficult to strike the correct balance between work and personal life when working
remotely. There are two major pitfalls. The first is working continuously since the computer desk is
constantly nearby.
For workaholics in particular, this is risky. In the long term, productivity at work rapidly falls if you are
working nonstop without appropriate breaks or any sort of life-work balance.
That is one of the reasons why some businesses mandate that all employees who do remote work use a
Virtual Private Network to access the internet (VPN).
The COVID-19 situation has altered our business practices. Even while remote work is now the standard,
some companies are more equipped than others to handle the unique issues it presents. Business leaders
must use the right work-from-home strategies in the future to ensure a successful approach to remote work.
When the Objectives and Key Results (OKRs) framework is implemented correctly, teams may
successfully overcome major obstacles to working remotely. The main goal of this project is to learn about
potential cyber security issues that LOLC PLC may encounter when doing remote work and to identify
potential remedies.
The project's primary objective was to determine how working remotely affected cyber security. In other
words, the Covid-19 malware encouraged LOLC workers to work remotely. But there are significant
security issues with remote work. In other words, there were issues with cyber security like the influence
of hackers, virus entrance, and data theft. To prevent it, it should be planned for in the project. As a result,
the project's goal was to recognize and prevent cyber security problems brought on by working remotely
with LOLC PLC.
1.2 (M1) Produce a comprehensive project management plan, the plan should include milestone
schedule and project schedule for monitoring and completing the aims and objectives of the
project (P2) that includes cost, scope, time, quality, communication, and risk and resources
management.
A project plan is a collection of official papers outlining the project's execution and control phases. In
addition to addressing scope, cost, and schedule baselines, the plan takes risk management, resource
management, and communications into account. Project managers utilize project planning software to
make sure their plans are comprehensive and reliable.
With online Gantt charts that arrange job dependencies, resource hours, labor expenses, milestones, and
more, Project Manager enables you to create thorough project plans.
Project Information:
Project title The impact of Cyber Security risk of Working Remotely with special Emphasis
on LOLC PRIVET LIMITED COMPANY
Project objective
The Triple Constraint is what, then? That's simple—a it's representation of the limitations that come with
project management. These restrictions come in three forms:
The Triple Constraint basically asserts that the project's price, time frame, and scope all have an effect on
its success. By balancing these three restrictions through trade-offs, you may handle the triple constraint as
a project manager. In the part below, we'll go through how these trade-offs function.
Although the Triple Constraint is a crucial component of any project that succeeds, success is not
determined by it. More than the three components that make up the Triple Constraint are used to construct
projects. In order to more accurately represent the most crucial components of a project, several project
management specialists have added three additional restrictions to the model. These are them:
Working remotely poses cyber security risks. To do this, the LOLC Company’s information should be
safeguarded. For so, a project should be created to identify and prevent these security issues. In order to do
that, a project must be begun, and within three months, LOLC Company must have the solutions. The
project's start date was May 20 and its completion date was August 20. In other words, the project needs to
be finished in three months. Time management is required for that. For this, a project schedule should be
made.
Activity Date
Begin End
According to the above timeframe, this project will cost us about three months.
The cost of the project must be taken into account by the project manager in order for it to be taken on and
completed. As the manager of the Asian International Institute, I must do this since it is the most crucial
project component. A project's overall cost can be categorized in the following ways. The project
manager's major purpose is the estimated cost required for the project. I've thus estimated the project's cost.
The following details the project's cost:
Some of the expenditures that were incurred throughout the project are listed above. In this case, the
project is anticipated to cost 12,000.00, yet only 9,900.00 has been spent. There was a 2100.00 save as a
result. The leftover sum is likewise specified in this case at the conclusion of the plan.
Project Scope:
As part of the planning process, project scope management assists in identifying and recording a list of all
project objectives, deliverables, due dates, and budgets. Large projects frequently undergo changes as they
go in project management.
The scope here is to improve cyber security in remote working. In this, the employees investigate the
activities that harm the corporate security during remote working from the news and work to identify the
problems here.
Project quality:
The ultimate objective of project quality management is to ensure that the deliverables meet the
requirements and expectations of clients, stakeholders, or customers, depending on the end-user.
(Anon., 2022)
Communication Plan:
A communication plan is a tactic used by a business to contact the target market and tell people about the
product, service, objectives, or upcoming activities of the brand. It outlines the primary message that must
be sent, the audience that it must reach, and a plan for how your message will be delivered to the chosen
audience. The message, the medium, and the target are the three parts of a communication plan.
The conventional communication strategy usually includes the present state of the firm, business
objectives, target audience, key messages, chosen media, schedule, and metrics for tracking success. Plans
for communication often fall into one of two categories: internal or external. The plan for external
communication is directed towards the company's clients, the general public, governmental organizations,
or investors. A company's internal communication plan is directed at all of its workers or specific subsets
of them, such as those working in a single location or department. (awwawer, n.d.)
Meeting minutes
Change request log
and issues log
Human resource planning is the systematic, continuing process for maximizing the utilization of a
company's most valuable resource—high-caliber people (HRP). Planning for human resources ensures the
best possible fit between job candidates and jobs while avoiding staffing shortages or overuse. These four
essential steps make up the HRP process. They involve planning, balancing anticipated labor demand with
reserves, evaluating the available labor market, and advancing organizational goals. Any company that
wants to sustain efficiency and profitability must have HRP. 2022 (Investopedia.com) Human resource
planning is the systematic, continuing process for ensuring the greatest possible utilization of a business's
most valuable resource—qualified people (HRP). Planning for human resources helps to avoid staff
shortages and overuse of workers while ensuring the best possible fit between people and jobs. The HRP
procedure is made up of these four essential steps. Forecasting, matching anticipated labor demand with
reserve, evaluating the available labor pool, and supporting organizational goals are a few of them. To
preserve efficiency and profitability, every company needs HRP. Investmentpedia.com, 2022
Resource risk is the possibility that you won't have access to all the resources needed to finish a project.
There are numerous variables that might affect this risk, and many of them can be outside your project
manager's control. The potential effect of these risks may be significantly reduced, though, by being able to
recognize them and make plans for them.
If possible, you should build time into your project schedule to address these risks, so that when they do
arise, there are no delays.
RACI Matrix
"Responsible, Accountable, Consulted, and Informed" is the meaning of the abbreviation RACI. The RACI
chart is an illustration of a matrix of responsibilities that displays the cost at the lowest level of activity for
controlling cost and length. It is a charting system that shows the objective of the job at hand as well as the
steps that must be taken by each individual.
This helps to clear up misunderstandings about expectations, which in turn boosts project productivity and
enhances deliverables. Decisions are made more rapidly in this situation, and the effort is allocated fairly.
Risk Register:
A risk management technique for locating probable project setbacks is a document called a risk register.
This procedure tries to recognize, examine, and address hazards before they become issues. Although it is
frequently used in projects, risk management is also beneficial in production and product launches.
A risk register document, often called a risk register log, keeps track of any hazards that might affect a
particular project. Additionally, it contains details about the risk's importance and propensity to occur.
One of the most popular qualitative evaluation techniques is the Probability and Impact Matrix. It is based
on the two elements of risk: likelihood of occurrence and potential effects on the objective(s). The matrix,
which shows the possibility of the hazards happening and how they could affect the project objectives, is a
two-dimensional grid . The two axes of the matrix are multiplied to determine the risk score, often known
as the risk level or degree of risk.
High
Risk 03
Risk 04 Risk 01
Low Risk 06
Risk 07 Risk 08
Risk 09
Impact (Seriousness)
(P3) Produce a work breakdown structure and a Gantt chart to provide timeframes and stages for
completion:
1. Initiation
The most important stages of your project are highlighted on a horizontal chart called a milestone chart.
With each milestone reached, your team will be one step closer to completing the project. A milestone
chart is an excellent tool for showing project stakeholders how your project is progressing and for retaining
team morale.
That is, the time associated to the period should be separated into the beginning and the end of the period.
There should be a deadline set for this. To put it another way, a deadline should be set for finishing the job
within the necessary window of time (03 months). As a result, the project's timeline, from start to finish, is
as follows.
2022 May 20
1.3 Topic finalising
Gantt chart:
A Gantt chart is used in project management to show a project's process. The time required to finish each
sub-task for a certain project within a given time frame is depicted in a separate figure. In other words, by
describing the timeline created for the project, the project may be understood easily. The timeline of the
development is represented in the graph below. (2022, Asana.com)
It shows the duration of the job as a function of time graphically. Gantt charts are useful tools for
scheduling and planning projects. A Gantt chart shows the start and finish dates of the project as well as
other connections between project activities, allowing you to keep track of the tasks in relation to their
projected completion dates or defined milestones.
The time line's division is clearly seen in the preceding diagram. The three-month project is therefore split
into months. Here, each thesis topic is listed before the appropriate time period. The time spent on each
Milestone Chart:
An effective technique to see the most crucial phases of your project is with a milestone chart. Each
milestone your team completes moves you one step closer to finishing your project; in this manner,
milestones provide your team a sense of success and demonstrate how their work supports the main goal of
the project.
Task 02:
P4 Carry out small-scale research by applying qualitative and Quantitative research methods appropriate for
meeting project aims and objectives.
Through the collection of measurable data and the use of statistical, mathematical, or computer methods,
quantitative research is the systematic analysis of phenomena. Through the use of sampling techniques and
the distribution of online questionnaires, polls, and surveys, for instance, quantitative research gathers data
from current and future clients.
Professionals can conduct their business outside of an office environment by working remotely. Since it is
based on the premise that work need not be done in a certain area to be effective, information technology is
presently among the most extensively utilized technologies in the field of communication. The challenges
that the nation's residents have experienced with COVID-19 and the acute fuel scarcity may be cited as the
primary reasons why the concept of remote employment has grown in favor among the general public.
(Open Who, 2022)
The expanding online infrastructure has increased the security dangers facing Sri Lanka's corporate sector.
The author has believed since the industry's start that the use of remote workers will raise security issues
for Sri Lanka's business sector. The author made the decision to look at conversation-specific cyber
security issues that pertain to distant work. An employee who is not in the workplace may not be reachable
by recent business acquaintances and partners. Given how quickly technology has advanced, several
companies have even abandoned their traditional headquarters. They must conduct their business
elsewhere since they have a huge workforce that is distributed around the nation.
Due to the absence of technological advancements, working remotely has been challenging in the methods
that have been practiced in the past. An employee who is sick or otherwise unable to work cannot
communicate with coworkers or business partners. You can be prompted for an extra phone number, pager
number, or fax number when contacting a number for business-related activities. Even fully remote
employment was not as widespread as it is now. Due to the rapid growth of technology, several firms have
even decided to abandon their conventional headquarters. Due to the size of their personnel, which is
distributed across the nation, they are forced to run their firm from many locations. (Open Who, 2022)
One year after it initially surfaced, the Covid-19 pandemic's effects on the financial services industry are
still being felt. Financial institutions were under pressure to change to the digital environment even before
the epidemic. The LOLC Corporation was also impacted by this worst-case scenario. This implies that the
workers are unable to travel to their workplace to do their tasks. Additionally, their clients were unable to
Due to these circumstances, the Dialog firm also offered remote services to its clients, making it simpler to
give services to the business and its staff.
To stop any digital system from being hacked, you need cyber security. All of these factors are part of
cyber security. A complex information system is used to maintain it. Data breaches, identity theft, and
other cybercrimes may all be avoided with the correct cyber security measures in place. All of the above
stated expressions are related. Remote employment in the telecommunications sector can potentially be
impacted by cyber security. Thus, the idea of CIA Trade will have an impact on this. The initials "CIA
triad three" stand for accessibility, discretion, and reliability. These circumstances allowed the Dialog firm
to give services to its clients remotely as well, making it simpler to deliver services to the business and its
staff.
To stop any digital system from being hacked, cyber security is necessary. Each and every one of these
components is part of cyber security. It is kept up to date using an advanced information system. Data
breaches, identity theft, and other forms of cybercrime might all be prevented with the correct cyber
security measures in place. The above expressions are all related. In the telecommunications sector, remote
employment may also be impacted by cyber security. In other words, the idea of CIA Trade will have an
impact here. Availability, secrecy, and integrity are represented by the initials "CIA triad three".
The reliability of the form could be a way to judge the quality of the measurement technique used to gather
data. A valid result requires a trustworthy measurement process in order to be considered. While
examining the structure of a research, choose a life. Questionnaires are one of the media used to measure
construct, the theoretical variable being measured. These surveys are a component of the measurement
process. As a result, this measurement process should provide an associate with the accurate representation
Most surveys typically have what's referred to as face validity, which may be a matter of appearances. Do
the queries look like an affordable thanks to acquiring the knowledge we have a tendency to be trying to
find, however, are they really? There are alternative kinds of validity survey writers ought to attempt for.
Content accuracy
Internal accuracy
External accuracy
Content accuracy:
This is related to our capacity to create queries that accurately reflect the problem we usually examine
while making sure that important related topics aren't left out. For instance, we may be interested in
learning how clients utilize hair style items and just bring up how they used them in the previous week. In
this instance, we appear to be missing information on product usage in diverse climates (given that
humidity will give you a bad hair day associate degree excessively quickly). As a result, we can come
away from this lesson with an inadequate picture of customer behavior.
Internal accuracy:
This asks whether or not the queries we tend to cause will very make a case for the end result we would
like to analysis. In our hair styling product example, we'd like to raise queries that facilitate the USA to
determine factors that influence the choice of hair styling product. Here we tend to area unit trying to find a
relationship between freelance variables (e.g., hair type, hairstyle, etc.) and therefore the variable (e.g.,
chance to shop for the hair styling products).
This refers to the degree to which the survey sample's target population may be generalized from the
results. Everyone is aware that the way we ask questions might influence the answers we receive. To put it
another way, the questions should reflect how the target audience views the issue under study and how
they speak about it, which typically suggests the need for exploratory qualitative analysis. Assume for the
purposes of our example that we want to calculate the percentage of customers who choose our product
among the hairstyling product category. Otherwise, we won't be able to extrapolate the results to the class
as a whole. To do this, we'd like to include other brands that represent this class.
A questionnaire is used to gather data as part of qualitative research. The participants in the study will get a
questionnaire there. Following the completion of a questionnaire, data pertaining to it will be gathered.
Getting the information in writing in this case is more effective. This is so because most sources of
information are reliable. This approach not only aids in understanding. It is employed to respond to
inquiries on the validity of connections with factors that may be assessed in order to explain, forecast, or
regulate an event. The techniques used in qualitative research are listed below.
Online Surveys: The main goal of survey research is to understand a large population by using the
survey. The day of conducting surveys using a pen and paper is long past. Since they are
convenient and can be disseminated by email or internet, online surveys are currently a widely used
research tool. This strategy entails developing and implementing a survey with the most appropriate
survey questions.
Questionnaire: In other words, it's feasible to gather accurate data with a questionnaire. Here , A
questionnaire is a type of research tool made up of a set of inquiries intended to elicit information
from the respondents.
Questionnaires:
1. Employee Information’s
I. Are You?
Male
Female
Other
2. Confidentiality issues:
Totally Agree
Agree
Moderate
Disagree
Totally Disagree
Totally Agree
Agree
Moderate
Disagree
Totally Disagree
Totally Agree
Agree
Moderate
Totally Agree
Agree
Moderate
Disagree
Totally Disagree
3. Integrity issues
Totally Agree
Agree
Moderate
Disagree
Totally Disagree
II. Users' actions have caused the system to slow down occasionally:
Totally Agree
Agree
Moderate
Disagree
Totally Disagree
III. Issues arise while login into the user interface repeatedly:
Totally Agree
Agree
Moderate
Disagree
Totally Disagree
4. Accessibility problems:
From the discussion above, it is clear that the study combining the quantitative paradigm with qualitative
research via validity and responsibility has altered our perspective of what responsibility and validity imply
in terms of quality. Within the qualitative paradigm, responsibility and validity are characterized as trait,
rigor, and quality. I Triangulation is therefore defined as "a validity technique where researchers strive for
convergence across many and completely distinct sources of information to construct themes or categories
in a very particular study" (source). Responsibility, validity, and triangulation must thus be revised as we
have seen in order to reflect the many ways in which truth is produced if they are to be meaningful analysis
terms, particularly from a qualitative purpose of reading.
Cost savings: An online questionnaire is significantly more cost-effective than one that is
presented in person, over the phone, or by mail since there are no labor costs, paper costs, printing
costs, phone costs, or postal costs to consider.
Contact individuals right away: You may rapidly connect with your responders and get their
opinion by using a variety of distribution methods for your questionnaire, including emailing,
texting, posting a link to it on your website, and making it downloadable through a QR code.
Scalability: Because of the internet, it is quick and easy to increase the audience for your online
survey and practically target people all over the world. You only need to offer them a link to your
questionnaire, which may be done automatically through an email sent as part of a lead nurturing or
customer onboarding campaign.
Flexibility for respondents regarding when and where to finish their questionnaire: One
fantastic feature of an online survey is the flexibility for respondents regarding when and where to
complete it. Increased response rates may be achieved by giving respondents extra time to complete
your survey and even the option to start it and finish it later.
Data accuracy: Online questionnaire answers are automatically inserted into spreadsheets,
databases, or other software packages, reducing the risk of human error and enabling automatic
validation of the data. This is in contrast to methods like face-to-face and over-the-phone
questionnaires that require the interviewer to process respondent answers.
The aforementioned qualitative and quantitative studies have been examined using the proper
methodology. The findings of the research are listed below.
According to the above data, it appears that the representation of women in this institution is increasing and
it is 46.7%. Also, a percentage of 33.3% male representation is recorded.
According to the above information, it appears that most of the people working here have a BSC degree.
Also, the majority of the other people are those who are in an education level that is more work for a
diploma.
In this analysis, we find that 35.7% of people agree with this question in the middle and more.
As a result, 42.9% have expressed their opinion on this. And 29% will agree with this question.
About 35% have expressed their opinion against not using numbers and symbols for their password and
about 21% agree with this.
A moderate answer was given by the majority to the question that the self-set password to enter the system
is encrypted. And about 8% of people have expressed their opinion against this completely.
Conclusion:
In the analysis of Confidentiality Problems, our team found positive answers and looking at their answers
to these 4 questions, we can conclude that they are concerned about security and privacy. Also, they don't
Integrity issues
For this, the employees here were of the opinion that it is mandatory to enter the system using the password
in case of power failure. It shows 42% agreement.
It is reported that 50% of the employees agree that there are problems during repeated login to the user
interface and about 14% people are against this statement.
Another question we asked here, namely the question of using digital signatures in business management,
it was noted that 36% of the 20 employees we selected agreed with this statement.
When we ask about integrity issues, we can conclude that the password is required to access the system in
the event of a crash, and that the system is slowed down by the actions of users. Also, we can see in the
investigation from the employees that there are problems when accessing the user interface frequently, and
they are willing to use a digital signature.
As a solution to the question that backups should be available whenever needed, 35% of the employees
here have said that they definitely agree and 7.1% have said that they are against it.
3. Having problems logging back into the system following an unplanned power outage?
Having trouble getting back into the system after an unplanned power outage? 35% agreed and 35%
disagreed. And another 17% percentage said that they definitely agree with this.
4. Daily, weekly, and monthly updates are made to the company database.
Conclusion:
Based on the answers we got in the above inquiry about difficulties with access, our team came to a certain
conclusion. Here we first see that employees do not want to access the system from any location. Also, it is
the opinion of the employees to store the backups in the data warehouse on a daily and weekly basis and
thus the data is safe. Accessing the system during a power outage is difficult and we find that to be one of
the problems here.
Data analysis:
Although there are several groups, organizations, and specialists that approach data analysis in various
ways, the majority of them may be condensed into a universal description. Data analysis is the process of
modifying, processing, and cleansing raw data in order to obtain useful, pertinent information that supports
commercial decision-making. The process offers helpful insights and data, frequently displayed in charts,
graphics, tables, and graphs, which lessen the risks associated with decision-making. (Simplilearn, 2022)
Every time we make a decision in our everyday lives, we may observe a simple illustration of data analysis
by assessing what has happened in the past or what will happen if we take that action. In its simplest form,
this process involves looking at the past or future and making a choice based on that analysis. (Simplilearn,
2022)
Despite the fact that there are several data analysis techniques, they always fall into one of the two main
categories of qualitative analysis or quantitative analysis. (Simplilearn, 2022)
Analyzing qualitative data: Using words, symbols, images, and observations, this technique gathers data.
This approach does not employ statistics. The most typical qualitative techniques are:
Use content analysis to examine linguistic and behavioral data. (Simplilearn, 2022)
Working with information gleaned from surveys, interviews, and diaries requires narrative analysis.
Qualitative data analysis is the process of collecting, examining, and interpreting qualitative data—non-
numeric, conceptual information, and user feedback—in order to spot themes and patterns, answer to
research questions, and determine what actions should be made to enhance a product or service (QDA). In
other words, qualitative data analysis is applicable to non-numerical data like written documents, audio
recordings, notes, and transcripts of interviews. Is the range of procedures and methods used to convert the
amassed qualitative data into a description, understanding, or interpretation of the people and situations
under examination? The basis of a qualitative data analysis is often an interpretive theory. (Simplilearn,
2022)
Qualitative data analysis is the process of collecting, examining, and interpreting qualitative data, such as
non-numeric, conceptual data, and user feedback, in order to spot trends and themes, respond to research
questions, and determine what actions should be taken to enhance a service or website (QDA). In other
Qualitative research is difficult to predict and requires intensive cognitive processing. Finding thought and
opinion patterns via qualitative research is frequently done to explore further into issues. Both semi-
structured and unstructured data collection methods can be employed. Their website offers access to a
Text analysis is a method for identifying themes in texts that was developed for use in ethnographic
and discourse research. The researcher is also capable of decoding, extracting, and storing coded
data
.One technique for conducting extensive qualitative data analysis is ATLAS. Complex features of
this tool help handling and organizing massive volumes of data simpler. Atlas supports a broad
variety of media formats, including txt, doc, docx, pdf, mp3, mp4, and avi.
Software for qualitative analysis called QDA - Miner makes document management and other
common qualitative analysis tasks easier. In other words, software for computer-assisted qualitative
data analysis offers tools to aid qualitative research, such as content analysis, iterative
summarization, grounded theory approach, coding and text interpretation, and transcription
analysis.
Quantitative data analysis, though it seems complicated, basically refers to the analysis of data that is based
on numbers or that can be quickly "translated" into numbers without losing any value. (Gradcoach, 2022)
Gender, nationality, and native language, for instance, might all be "translated" into numbers without
losing their significance; for instance, English could equal 1, French 2, etc. (Gradcoach, 2022)
As I already said, statistical analysis techniques power quantitative analysis. Descriptive statistics and
inferential statistics are the two primary "branches" of statistical procedures that are employed. Depending
on what you're attempting to determine, you might solely utilize descriptive statistics in your study or you
might use a combination of both.
Descriptive statistics
Inferential Statistics
Descriptive statistics
Inferential Statistics:
As I previously stated, inferential statistics seek to draw conclusions about the population, whereas
descriptive statistics are all about the specifics of your particular data set, or sample. To put it another way,
you'll utilize inferential statistics to forecast what you'd anticipate finding in the entire population.
What sort of forecasts, I hear you ask? Using inferential statistics, researchers frequently try to make two
different kinds of predictions:
First, assumptions regarding group differences, such as height disparities between kids classified by
favorite foods or gender.
Second, correlations between variables, such as those between body weight and the quantity of yoga
practiced each week. To put it another way, when used correctly, inferential statistics let you draw
conclusions and anticipate what will happen in the general population based on what you see in your
The tools and procedures that will be utilized to analyze the information collected from the survey
questionnaire are listed below:
Charts, maps, and diagrams are devices used for gathering, analyzing, and displaying quantitative data for
a range of purposes and industries. Numerous programs and methods have been created for use in nearly
every industry, from research groups and data collection companies through manufacturing and quality
control. Although you'll need to learn how to utilize the data and understand the results, statistical analysis
tools can help to make the process as easy and straightforward as possible. Here is a summary of some of
the tools you may use to do statistical analysis on your data.
A popular general-purpose statistical tool for editing, analyzing, and displaying data is SPSS
Software.
N %
Excluded 0 .0
Total 20 100.0
Reliability statistics:
A measurement might be correct yet unreliable. In other words, reliable measurements can be made, but
you may not be measuring what you believe you are. A metric that is trustworthy and valid is the ideal.
The first four inquiries on the form might be referred to as the four hidden inquiries. The dependability of
the results of the analysis of the data collected for these questions is as follows.
Reliability Statistics
Here, the first four questions' dependability was evaluated. As a result, the dependability score for the
aforementioned table is 0.693. As a result, after assessing the secret data in the above table, Cornbrash’s
alpha value is more than 0.6, indicating that the data is credible. The company's employees all responded
the same to these four questions as a consequence. In other words, the response was provided accurately.
Integrity problems:
Four of the continuity questions in this passage are references to the following four questions. The
dependability was determined by examining the information that was provided for these four questions.
Reliability Statistics
.791 4
Accessibility problems:
The author has here linked the third four queries to four availability-related questions. Following are the
results of a reliable analysis of the data collected for these four questions.
Reliability Statistics
Cornbrash’s Alpha N of Items
.804 4
The dependability value is displayed as 0.804 in the study of Availability concerns in this table. Therefore,
Cornbrash’s alpha value is larger than 0.6 when examining continuous data, indicating the reliability of the
availability issues. In other words, the four questions have been satisfactorily answered.
Correlation Analysis:
A statistical technique used in research to determine the link between two variables and gauge the strength
of their linear relationship is correlation analysis. The magnitude of change in one variable as a result of
the change in the other is determined using correlation analysis, to put it simply. A high correlation
indicates a strong association between the two variables, whilst a low correlation indicates a poor
correlation between the two variables.
The privacy issues with remote work are listed in the table Follow. In other words, this measures
correlations. In this case, a negative (-) correlation coefficient denotes an opposing change in the two
variables. The correlation coefficient in this case is -.189. This suggests that there is no positive correlation
Correlations
CI RWE
N 20 20
N 20 20
The links between integrity concerns and remote work experience are displayed below in the second table.
In light of this, a negative (-) correlation coefficient denotes an opposing change in the two variables. The
correlation coefficient between and here is -.424 This suggests that there is a bad correlation between the
variables. As a result, there will be more problems with continuity and less benefits of working remotely.
As a result, the Pearson correlation coefficient value indicates that there is very little link between integrity
difficulties and distant work experience characteristics. According to the Pearson correlation coefficient
value, there is a significant positive linear association between integrity difficulties and remote working.
The two variables move in the same direction when the correlation coefficient is larger than 0. It is -381 for
the correlation coefficient. This shows a favorable correlation between the two variables. This suggests that
there is no positive correlation between the two variables. It indicates a rise in availability concerns and a
decline in the remote working environment. The connection's strength is poor. Thus, a substantial positive
linear association between Integrity concerns and characteristics of remote working is indicated by the
Pearson correlation coefficient value.
Correlations
II RWE
N 20 20
N 20 20
Descriptive statistics:
Descriptive statistics both describe the "center" or anticipated value of a variable's central tendency and
dispersion (the response distribution of the variable). Even when measures of central tendency and
dispersion are improper, SPSS nevertheless runs statistics. Below are the descriptive data that came from
an examination of the concerns related to confidentiality, integrity, availability, and remote working
experience.
Here, the first question's lowest and maximum ranges are 4.0 and 5, respectively. Its standard deviation's
mean value is 3.650. The majority of people have responded in a neutral manner. The lowest range for the
second question is 3.0, the maximum range is 5, and the mean standard deviation is 4.9. In the third
question, the lowest and greatest ranges are 3.0 and 5.0, respectively, with a mean standard deviation of
3.900. The lowest and highest ranges in the fourth question are 2.10 and 2.90, respectively. Here, the
standard deviation's mean value is 1.800.
The aforementioned statistics are descriptive and are examined for confidentiality. Data was collected from
20 individuals for anonymity purposes, and after analysis, it was determined that the lowest range is 2.70
and the greatest range number is 3.50. As a result, the standard deviation's mean value is shown as 3.204.
In other words, this number is 3 times 3. Here, "not taken" is mapped to the number three on a Likert scale.
and this is in reference to the common response. That is, no decision has been made about the
questionnaire's response. That is, maintaining one's position or remaining neutral. A standard deviation can
have a value between 0 and infinity. A list of numbers with a standard deviation of 0 are all the same. In
light of this, the deviation is 0.209.
Descriptive Statistics
N Minimum Maximum Mean Std. Deviation
Valid N (listwise) 20
The lowest range in this first question is 3.0, and the maximum range is 5. Its standard deviation's mean
value is 3.800. The majority of people have responded in a neutral manner. In the second question, the
minimum and maximum ranges are 1.0 and 4, respectively, with a mean standard deviation of 1.950. The
third question's ranges are as follows: 1.0 for the lowest, 3.0 for the highest, and a mean standard deviation
of 2.200. The lowest and maximum ranges in the fourth question are 1.0 and 5.0, respectively. Here, the
standard deviation's mean value is 2.250.
The aforementioned descriptive statistics are checked for integrity problems. Here, data for Integrity was
collected from 20 participants, and after analysis, it was determined that the lowest range is 2.80 and the
greatest range value is 3.40. As a result, 3.248 is displayed as the mean value of the standard deviation. In
other words, this number is 3 times 3. The lowest range in the third question is 1.0, the greatest range is
3.0, and the mean standard deviation is 2.200. The lowest range in the fourth question is 1.0, while the
greatest range is 5.0. The standard deviation in this instance is 2.250 on average.
These descriptive statistics are examined for integrity problems. 20 persons provided the data for Integrity
in this instance, and after analysis, it was determined that the lowest range is 2.80 and the greatest range
number is 3.40. As a result, the standard deviation's mean value is shown as 3.248. In other words, this
amount is equivalent to 3.
Descriptive Statistics
N Minimum Maximum Mean Std. Deviation
Valid N (listwise) 20
Accessibility problems:
Here, the first question's lowest and maximum ranges are 1.0 and 4, respectively. Its standard deviation's
mean value is 1.900. In the second question, the lowest and greatest ranges are 2.0 and 5.0, respectively,
with a mean standard deviation of 2.550. The third question's ranges are as follows: 1.0 for the lowest, 3.0
for the highest, and 2.000 for the mean. The lowest and maximum ranges in the fourth question are 1.0 and
5.0, respectively. Here, the standard deviation's mean value is 2.050.
Here, the lowest range in the first question is 1.0, and the greatest range is 4. Its standard deviation is 1.900
on average. The lowest range in the second question is 2.0, the greatest range is 5.0, and the mean standard
deviation is 2.550. The lowest range in the third question is 1.0, the maximum range is 3.0, and the mean
standard deviation is 2.000. The lowest range in the fourth question is 1.0, while the greatest range is 5.0.
The standard deviation in this instance is 2.050 on average.
Descriptive Statistics
N Minimum Maximum Mean Std. Deviation
Valid N (listwise) 20
Conclusion:
Here, 20 persons have provided information in response to inquiries about confidentiality. This falls
between 2.70 and 3.50. From narrow range to big range, in other words. The average here is 3.204. This
indicates that the LOLC Company personnel are ignorant of these problems and their solutions. As a result,
participants did not decide on the LOLC Company’s confidentially. Therefore, a negative (-) correlation
coefficient denotes an opposing change in the two variables. The correlation coefficient in this case is -
.189. Here, 20 persons have provided information in response to inquiries about confidentiality. This falls
between 2.70 and 3.50. From narrow range to big range, in other words. The average here is 3.204. This
indicates that the LOLC Company personnel are ignorant of these problems and their solutions. As a result,
participants did not decide on the LOLC Company’s confidentially. Therefore, a negative (-) correlation
coefficient denotes an opposing change in the two variables. The correlation coefficient in this case is -
.189. In other words, there is a negative correlation between the two variables. It indicates a rise in privacy
issues and a decline in the benefits of working remotely. Here, the Pearson correlation coefficient value
reveals a very slender negative association between factors related to privacy concerns and remote work
experience. As a result, LOLC may operate remotely, allaying privacy worries.
The author was able to reach a conclusion after analyzing integrity-related problems. In other words, 20
individuals have responded to these integrity-related queries. The range in this case is 2.80 to 3.40. Here,
3.248 is the mean value. The company's employees generally cite it as the most noteworthy response. The
author was able to pinpoint the company's integrity problems in this situation. Correlations in this case are
-.424. as a result, the opposite side is (-) when one side is (-). As a result, Dialog Company is able to
function remotely by minimizing integrity problems.
(P6)Describe appropriate recommendations as a result of research and data analysis to draw valid
and meaningful conclusions
The following recommendations are applicable based on the aforementioned qualitative and quantitative
study results and analyses for LOLC Company project planning success:
Recommendation:
According to our analysis, even though the employees were given moderate opinions about the use of a
fingerprint scanner when entering the system, it is seen that they have no idea about it. Therefore, in cyber
security, security should be provided so that no other external party can access its system. We concluded
that they should be informed about that.
It is also important to use numbers and symbols to further strengthen your passwords. Employee passwords
can also be changed once in a certain period of time.
According to the inquiry from the employees, there is more preference to use self-generated password, so
we can create very strong passwords by giving the employees of the company to use a system-generated
password. Therefore, the impact on cyber security is reduced.
Using integrity issues brought on by remote working to identify cyber security problems:
Recommendation:
When talking about integrity issues, we came to some recommendations with our analysis. Here, due to the
system slow caused by the traffic in the company's system, cyber security may be disturbed in some way.
Therefore, the weakness of the system should be updated.
Also, in the event of an emergency power outage, you must enter the password to access the system again.
There should also be a shift to a digital signature system to verify the identity of employees, thereby
helping cyber security.
Using availability issues brought on by remote working to identify cyber security problems:
Recommendation:
These days, in Sri Lanka's power outages, workers who work from their homes are affected. In the event of
a sudden power outage, there is a possibility that one's work will be lost. To prevent it, the system should
Action Plan:
An action plan is described as a document or checklist that lists the activities or duties that must be carried
out in order to accomplish the goals that have been established.
An action plan, which is a component of strategic planning, is essential to project management because it
enables teams to work together efficiently, communicate clearly, and complete a project from beginning to
end. (Bit Tech, 2022)
Action Plan
The issues in the Method of securing work-finishing day The person
company the issues responsible for the
work
1. Working The amount of time 25 / 09 / 2022 Mr. Achala Gamage
remotely can harm remote workers (Manager of LOLC
people's mental spend at work has to company)
health. be reduced.
2. Remote working Employers must 18 / 09 / 2022 Mr. AcHala Gamage
doesn't increase encourage people to (Manager of LOLC
employee work physically. company)
productivity and
efficiency.
3. Not updating the Daily, weekly and 08 / 09 / 2022 Mr. Achala Gamage
database daily, monthly database (IT manager of
weekly and updates. LOLC company)
monthly.
(P7)Provide a reflection on the value of undertaking the research to meet stated objectives with your
own learning and performance which includes a discussion of the project outcomes, its usefulness to
support sustainability of the given organization and its’ performance
The LOLC Company's aforementioned quantitative and qualitative study is the most beneficial for making
this project successful since these two studies aid in identifying cyber security risks associated with remote
working and helping to discover solutions to those risks. Employees must work from home due to the
present scenario, as it is the primary emphasis of the LOLC firm. Research plays a critical function in the
global commercial sector for giving the project meaning and making it practicable. By displaying the
project start and duration time required to complete the project, the Gantt chart aids LOLC Company.
The critical route, which displays the anticipated project completion days, may also be discovered using
the network diagram. Although any project requires time and money to complete, with the right planning,
it can be completed efficiently and on schedule. I was able to complete this assignment by applying my
knowledge from my research and the research method to all of its criteria. Additionally, I discovered that I
was successful in handling data collecting to determine the precise study findings. I also identified the best
course of action for better resolving all pertinent project sectors. I did, however, find it challenging and
challenging to write such a long research project because it was my first time to conduct and complete a
research project. Additionally, I found that data collecting was difficult since it took a lot of time and effort
to get the necessary data to determine the results. My project was well-organized and information-rich
since my instructor had helped me with the project's framework and structure. It served as a reminder to
me that I need to sharpen my research writing abilities in order to succeed at the project's content and
effectively complete the research criteria.
Communication skills: I have acquired communication skills via my work as a project manager at
LOLC Company and have applied them to the project. I was in contact with several parties,
including staff members, material suppliers, technicians, and so on.
Leadership skills: I had to oversee all project operations as the project manager for LOLC
Company, which was crucial for my education and helped me perform better.
Team management skills: I've learned a valuable lesson about teamwork, and I consider it crucial
to my effectiveness. The LOLC Company project was successfully completed thanks to the efforts
of the team management.
Negotiation skills: I had to discuss the project with a huge number of delegates and other
stakeholders while operating it. I now understand how to handle the stakeholders and negotiate
favorable terms with the clients. I can learn a lot from this.
Risk management skills: Every computer project has a certain amount of risk, hence the project
management must possess some capability of controlling risk. So as a researcher for the LOLC
Company, I've learned a few things about managing project risks, and having this characteristic has
enabled me to complete the project effectively and to reach the project's goal.
Cost control: As a researcher for the LOLC Company, I have acquired knowledge of the
procedures for project cost management. The most crucial aspect of a project is control, and I am
quite knowledgeable about how to control a project's costs.
The production of in-depth and pertinent suggestions as well as learning during the project may be
influenced by the project management process, the Project Outcomes, the decision-making process, and
modifications or developments of the project management plan. Planning is actually one of the key aspects
that has helped me complete this project and reach my goals. In order to accomplish the objectives and
goals, it helps me to create a consistent route to seek the project results. It is important to note that a
detailed strategy will likely aid me in outlining what must be done first to save time and effort and better
complete the job. Additionally, after finishing this study, I recognized that strong time management is the
key to my ability to conduct and finish a regular research assignment better and more successfully. It
allowed me the opportunity to outline the whole content of my project in a certain amount of time and
empowered me to avoid wasting too much time on a chapter in order to concentrate on the project's key
components. My lecturer's help also contributes to the results of academic success and personal growth. In
actuality, my professor did encourage me in moving in the right way for the study by assisting me in
realizing the areas of my project's weakness. In addition, the instructor helped me pick the topic that would
yield the best academic research results and motivated me to do so. Additionally, it appears that the
project's learning and suggestions are shaped by the decision-making involved in project management. In
actuality, decision-making aids in monitoring and controlling project implementation, presenting some
essential adjustments to drive project execution to fulfill the objectives, delivering the appropriate
recommendations, and aiding in project learning (Bruce, Pope and Stain street, 2008). Furthermore,
because the project initially failed to proceed in the appropriate methods to determine the findings of the
questionnaire, decision-making also aids in resolving planning issues. Basically, the modifications and
advancements made to this project management plan have been noted in order to show how they support
the researcher in addressing the research's shortcomings and assisting in meeting high standards for project
results and performance. Additionally, it enables tightening project management controls to better manage
project results and make them more dependable and effective.