Bsbpmg414 Information Security Risk Assessment Answers


  • Internal Code :
  • Subject Code : BSBPMG414
  • University : Victoria University
  • Subject Name : Management

Apply Project Information Management and Communications Techniques - Question 1

Summarise models and methods of communications management in context of project life cycle and other project management functions (approx. 150 words).

Answer:

Project management functions are required to be collaborative where connection between all the responsible persons is highly appreciated and required. The communication model involves three parts such as sender, receiver and the message. The management of communication includes the process of developing, gathering, distributing, accumulating, retrieving and the ultimate nature of project information. This is performed in the first stage of project life cycle where initial project information is required to be distributed among the related persons. It is required to decide the audience or target audience whom the message is intended to such as sponsors, team members, customers and so on (Ferreira et al. 2017).

An objective of the message to be shared is required to be developed so that during the phase of execution team members and other stakeholders remain aware of the project status. At the time of closing the project effective communication helps in revisiting the overall project performance to ensure all members are aware of the project outcome. Communication method might include interactive communication where meetings and conference calls help in increasing communication between the members. Push communication is used when the sender of the message does not what response or feedback from the receiver.

Apply Project Information Management and Communications Techniques - Question 2

Explain importance of information security in managing risks in project management. (approx. 70 words)

Answer:

Project owner is required to clearly define the information security throughout the project lifecycle. It plays an important role in protecting the access of project information from any unauthorized ID which helps in keeping the project information confidential (Turskis et al., 2019). Issues or potential breaches of information, risks such as copyright issues can be addressed. The triad of information security such as confidentiality, integrity and availability is required to be considered and for the security purpose, Anti-Virus, Firewall, BYOD can be used or adding new members into the project.

Apply Project Information Management and Communications Techniques - Question 3

Outline methods of reviewing outcomes in project management. (approx. 100 words)

Answer:
The methods of reviewing project outcomes includes gap analysis. Here, it is required to understand how the intitial project objectives and outcomes differ from each other and which area is not addressed properly. A thorough examination is conducted in order to understnd if the project goals are achieved. It is also required to assess the level of satisfaction of the stakeholders and sponsors as it is an important indicator of the project success. As mentioned by Ewinet al., (2017), a cost benefit analysis is required to be conduced to understand, if the investment made has successfully covered all the required area and benefitted the project. If there is discripancy, planning for further development is required to be created. However, sufficient recommendation for the future project management is provided.

Apply Project Information Management and Communications Techniques - Question 4

When conducting meetings regarding specific projects, identify what legal and ethical requirements participants must adhere to and explain why? (approx. 50 words)

Answer:

Legal requirements in a fair project management meeting is providing a proper notice prior to the meeting date with an assurance that the participants for whom the project is intended are aware of the objectives, importance and requirements of the meeting. It is due to the legal responsibility of the project manager to interact about every decision made about the project. After conducting the meeting a Minute is required to be prepared to summarize the meeting identifying the main objectives, targets set and method suggested for progressing with the project. In some specific project managers are required to consider the voting rights if applicable for decision making (Dickert et al., 2017).

Project participants are required to hold themselves as accountable for any successful or failed decision made in the meeting which is an ethical requirement. It is due to the ethical responsibility of the project meeting participants for showing respect and regard to the decision made by the participants (Bodó et al., 2017). While conducting a meeting every participant are required to provide with the opportunity to place their concerns.

Reference List for Apply Project Information Management and Communications Techniques

Bodó, B., Helberger, N., Irion, K., Zuiderveen Borgesius, F., Moller, J., van de Velde, B., ... & de Vreese, C. (2017). Tackling the algorithmic control crisis-the technical, legal, and ethical challenges of research into algorithmic agents. Yale JL & Tech., 19, 133.

Dickert, N. W., Eyal, N., Goldkind, S. F., Grady, C., Joffe, S., Lo, B., ... & Wendler, D. (2017). Reframing consent for clinical research: a function-based approach. The American Journal of Bioethics, 17(12), 3-11.

Ewin, N., Luck, J., Chugh, R., & Jarvis, J. (2017). Rethinking project management education: a humanistic approach based on design thinking. Procedia Computer Science, 121, 503-510.

Ferreira, F., Faria, J., Azevedo, A., & Marques, A. L. (2017). Product lifecycle management in knowledge intensive collaborative environments: An application to automotive industry. International Journal of Information Management, 37(1), 1474-1487.

Turskis, Z., Goranin, N., Nurusheva, A., & Boranbayev, S. (2019). Information security risk assessment in critical infrastructure: a hybrid MCDM approach. Informatica, 30(1), 187-211.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Management Assignment Help


Book Online Sessions for Bsbpmg414 Information Security Risk Assessment Answers Online

Submit Your Assignment Here