Project Management Information System
Project Management Information System
TOPIC 1.
“An Information system (IS) is the study of complementary networks of hardware and
software that people and organizations use to collect, filter, process, create, and
distribute data.
“Information systems are combinations of hardware, software, and telecommunications
networks that people build and use to collect, create, and distribute useful data, typically
in organizational settings.”
Providing key project stakeholders with the right information at the right time can
significantly improve decisions to adjust, change and guide the project to improve its
outcomes. A Project Management Information System serves five principal purposes:
Technology
Technology can be thought of as the application of scientific knowledge for practical purposes.
From the invention of the wheel to the harnessing of electricity for artificial lighting, technology
is a part of our lives in so many ways that we tend to take it for granted. As discussed before, the
first three components of information systems – hardware, software, and data – all fall under the
category of technology. Each of these will get its own chapter and a much lengthier discussion,
Hardware
Information systems hardware is the part of an information system you can touch – the physical
components of the technology. Computers, keyboards, disk drives, iPads, and flash drives are all
examples of information systems hardware. We will spend some time going over these
components and how they all work together in chapter 2.
Software
Software is a set of instructions that tells the hardware what to do. Software is not tangible – it
cannot be touched. When programmers create software programs, what they are really doing is
simply typing out lists of instructions that tell the hardware what to do. There are several
categories of software, with the two main categories being operating-system software, which
makes the hardware usable, and application software, which does something useful. Examples of
operating systems include Microsoft Windows on a personal computer and Google’s Android on
a mobile phone. Examples of application software are Microsoft Excel and Angry Birds.
Software will be explored more thoroughly in chapter 3.
Data
The third component is data. You can think of data as a collection of facts. For example, your
street address, the city you live in, and your phone number are all pieces of data. Like software,
data is also intangible. By themselves, pieces of data are not really very useful. But aggregated,
indexed, and organized together into a database, data can become a powerful tool for businesses.
In fact, all of the definitions presented at the beginning of this chapter focused on how
information systems manage data. Organizations collect all kinds of data and use it to make
decisions. These decisions can then be analyzed as to their effectiveness and the organization can
be improved. Chapter 4 will focus on data and databases, and their uses in organizations.
Since information is already in a summarized form, it must be understood by the receiver so that
he will interpret it correctly. He must be able to decode any abbreviations, shorthand notations or
any other acronyms contained in the information.
ii. Relevant:
Information is good only if it is relevant. This means that it should be pertinent and meaningful
to the decision maker and should be in his area of responsibility.
It should contain all the facts that are necessary for the decision maker to satisfactorily solve the
problem at hand using such information. Nothing important should be left out. Although
information cannot always be complete, every reasonable effort should be made to obtain it.
iv. Available:
Information may be useless if it is not readily accessible ‘ in the desired form, when it is needed.
Advances in technology have made information more accessible today than ever before.
v. Reliable:
vi. Concise:
Too much information is a big burden on management and cannot be processed in time and
accurately due to “bounded rationality”. Bounded rationality determines the limits of the
thinking process which cannot sort out and process large amounts of information. Accordingly,
information should be to the point and just enough – no more, no less.
vii. Timely:
Information must be delivered at the right time and the right place to the right person. Premature
information can become obsolete or be forgotten by the time it is actually needed.
Similarly, some crucial decisions can be delayed because proper and necessary information is not
available in time, resulting in missed opportunities. Accordingly the time gap between collection
of data and the presentation of the proper information to the decision maker must be reduced as
much as possible.
viii. Cost-effective:
The information is not desirable if the solution is more costly than the problem. The cost of
gathering data and processing it into information must be weighed against the benefits derived
from using such information.
In this section, we will look at manual information systems vs. computerized information
systems.
A manual information system does not use any computerized devices. The recording, storing and
retrieving of data is done manually by the people, who are responsible for the information
system.
The following diagram illustrates how a typical manual information system works
Advantages:
Disadvantages:
Time consuming –all data entries need to be verified before filing, this is a time
consuming task when done by humans. Retrieving data from the filing system also takes
a considerable amount of time
Prone to error – the accuracy of the data when verified and validated by human beings
is more prone to errors compared to verification and validation done by computerized
systems.
Computerized systems were developed to address the challenges of manual information systems.
The major difference between a manual and computerized information system is a computerized
system uses a combination of software and hardware to record, store, analyze and retrieve
information.
Advantages:
Fast data processing and information retrieval – this is one of the biggest advantages
of a computerized information system. It processes data and retrieves information at a
faster rate. This leads to improved client/customer service
Improved data accuracy – easy to implement data validation and verification checks in
a computerized system compared to a manual system.
Improved security – in addition to restricting access to the database server, the
computerized information system can implement other security controls such as user’s
authentication, biometric authentication systems, access rights control, etc.
Reduced data duplication – database systems are designed in such a way that
minimized duplication of data. This means updating data in one department automatically
makes it available to the other departments
Improved backup systems – with modern day technology, backups can be stored in the
cloud which makes it easy to recover the data if something happened to the hardware and
software used to store the data
Easy access to information – most business executives need to travel and still be able to
make a decision based on the information. The web and Mobile technologies make
accessing data from anywhere possible.
Disadvantages:
Summary
Data capture, or electronic data capture, is the process of extracting information from a document
and converting it into data readable by a computer.
Methods For Capturing Data
OCR technology is used to capture data from structured documents, usually those that have been
word processed. The software works by converting documents into machine readable files, once
this has happened you can search by keywords contained within it, great for files containing
large amounts of data.
b) Intelligent Character Recognition (ICR)
ICR technology is an adapted version of OCR, the difference being that ICR is able to read
handwritten text and convert it into computer readable information. Often used for unstructured
documents such as letters, unstructured documents and other handwritten business
correspondence.
Paperless forms allow information to be captured whilst out in the field, transforming the way
data comes in and out of a business. Data is captured using a mobile device and can be
transferred straight into office systems, with no paper processing involved or delays.
e) Barcode Technology
Barcode technology is a data capture method that allows metadata such as customer name,
address and contact numbers to be pre populated into barcode format prior to forms being sent.
This form of data capture significantly reduces manual data entry requirement upon return.
Double blind data entry is a form of manual data entry using two operators and validation
software to increase accuracy. The software will flag up any discrepancies between both sets of
data and errors must be corrected before they can move.
A Transaction Processing Systems (TPS) is used primarily for record keeping which
is required in any organization to conduct the business. Examples of TPS are sales
order entry, payroll, and shipping records etc. TPS is used for periodic report
generation in a scheduled manner. TPS is also used for producing reports on demand
as well as exception reports.
5. Workflow System
7. Expert Systems
The expert systems have the ability to make suggestions and act like an expert in a
particular field of an organization. An expert system has an extensive knowledge
base.
Scope planning – specifying the in-scope requirements for the project to facilitate creating the
work breakdown structure
Preparation of the work breakdown structure – spelling out the breakdown of the project into
tasks and sub-tasks
Project schedule development – listing the entire schedule of the activities and detailing their
sequence of implementation
Resource planning – indicating who will do what work, at which time, and if any special skills
are needed to accomplish the project tasks
Budget planning – specifying the budgeted cost to be incurred at the completion of the project
SETTING OBJECTIVES
Agreeing objectives can be one of the most important tasks you will undertake as a project
manager. Occasionally, the project sponsor, your guide and supporter in the project, will hand
down a full set of project objectives. More commonly, however, the project sponsor will provide
a broad direction, or a general aim, from which the project manager produces more tightly
defined objectives.
Clarity of objectives is not only important in identifying exactly what is to be done but it also
allows you to:
Objectives define what a project is trying to achieve, the steps by which the aim will be achieved
and how success will be recognized. The SMART principle is often applied to objectives. They
should be:
Definition- work breakdown structure (WBS) is a method that breaks a project down into a
hierarchy of deliverables, tasks, and subtasks.
The work breakdown structure visually defines the scope into manageable chunks that a project
team can understand, as each level of the work breakdown structure provides further definition
and detail.
The following guidelines should be considered when creating a work breakdown structure:
A project budget is the total sum of money allocated for the particular purpose of the project for
a specific period of time. The goal of budget management is to control project costs within the
approved budget and deliver the expected project goals.
What is a timeline?
A timeline is a chronological order of events. In most cases, it is a line with dates, events or
actions.
Timeline elements
Of course, it depends on a project. But there are typical elements that timelines should include in
any case.
Creating a project strategy starts with a clear understanding of the final goal. It might be the
outcome you’ve agreed on with a client or a business goal you’d like to achieve with a long-term
project.
It’s important that the entire team agrees on your mutual goal. Avoid misunderstandings
already in the planning phase to simplify the prioritization process, and ask for everyone’s
approval for the main goal.
Project milestones are a great way to illustrate, schedule, and evaluate your project’s progress.
They could signify key meetings, approvals, project phases, or partly delivered work.
Milestones are small actionable steps that lead to your main goal. By breaking big projects
into smaller chunks, your team’s able to keep track of every project phase and notice the
shortcomings such as crossed deadlines.
After you’ve made a list of all the important project milestones, it’s time to set a reasonable
timeframe for achieving each of these objectives.
Be careful not to overrate your team’s capacity in this phase of planning. Failing to meet the
first milestone will also mean less time for the next ones, leading to many crossed deadlines.
Consider how much input, work, and resources reaching each milestone will take.
A thoughtful project management schedule can be used throughout the project, not just in the
initial planning phase. You should be able to use the timeline to keep track of project progress,
and to communicate progress at status meetings.
To get the maximum benefit out of a project plan, it should be logical and visualized. Answer a
couple of questions to decide which layout to use:
Are all parts of the timeline shared with the entire team? – If not, you’ll need to create
multiple project timelines plus a “master timeline” with all the project steps.
Do you need to make edits as the project progresses? – In this case, make sure that your
project timeline’s in an editable form (not a PDF or a printed version)
Do you need to add multiple layers of information? – Complex projects need sub-tasks to
manage each activity. You might need a better tool than a spreadsheet to keep track of every
important detail.
Now that you’ve got a clear overview of your project goals, milestones, and timeframe, it’s time
to finally create the timeline.
There are multiple tools that can help you create an actionable project plan. Think twice before
you download an Excel project template. These free templates might be easy-to-use, but lack the
flexibility needed to plan more complex projects.
If you want to be able to track your project progress and have a complete overview of your
team’s work, start using a project management tool. These tools are built to help you with
every aspect of project management, including work planning, task management, budgeting,
and business intelligence.
Before you consider your project timeline to be safe for work, take an extra step that will pay off
in the future – review the project plan with your team and clients.
Start with your team. Ask everyone to take a look at your roadmap and check whether all the
important milestones are present. Encourage people to speak up if they notice something
questionable or consider your timeframe too packed. It’s better to set things straight before
starting the project, not a couple of weeks into the progress.
Don’t forget to ask for your client’s approval. You don’t need to show them the entire project
timeline, but ask them to confirm some of the milestones and delivery dates. Explain why each
After you’ve set up your project management timeline and have everyone’s approval, it’s time to
get into action. Share the final roadmap with all your team members and explain how to use the
framework.
Ensure once more that everyone’s aware of their work tasks and contribution to each step
of the project. If someone’s not engaged in a certain project step, find ways to use their potential
and time on other projects instead.
Having a clear overview of upcoming and completed tasks helps to keep the level of motivation
high, and increases your team’s overall productivity.
One of the main benefits of having a project timeline is that you’re able to track your team’s
progress. You’ll know what everyone’s working on, where you’re currently standing, and can
easily communicate this information to other counterparts.
Make your project timeline actionable and reflective of the real-time situation by asking
everyone to mark their progress.
If you’re using online project management software, progress could be tracked done by marking
project tasks done. Find a method that works best for you and your team. Check this article to
learn about time tracking best practices and apply these to your project management.
Project Flow is an indicator of change planned for occurrence within a project over time. It
shows the movement of project product from its conceptualization and design through delivery
and deployment. Project flow describes a preset sequence of activities required to plan, produce,
deliver and maintain project product, along with information, materials, and resources required
by the project.
Project flow is a convenient way to define and plan projects. It helps link project budget and
schedule to project activities and tasks. Traditionally it is designed in the form of a chart or
diagram which is a great tool to visually represent how a project is supposed to produce and
deploy its product. Simple tree-like lists or hierarchies of project activities are also used to map
out and depict project flow.
There are key components that create project flow. These components are:
GANTT CHART
definition
a) A Gantt Chart is a table that illustrates the course of a project and all the elements
involved. Gantt Charts are a useful tool when you want to see the entire landscape of
either one or multiple projects. It helps you view which tasks are dependent on one
another and which milestones are coming up.
b) A Gantt chart is a type of bar chart that illustrates a project schedule and shows the
dependency relationships between activities and current schedule status.”
It’s not a good feeling when you get stuck in a project and you don’t know where things are
going. Although it’s quite common to get stuck while working on a project, however, Gantt
charts let you see things with a lot more clarity with just a click. As you can instantly see the
progress of tasks, it helps you and others working on a project to develop a better understanding
of how things are unfolding. More clarity means better understanding which further leads to
successful completion of a project.
You might not know how long it’s going to take to complete the project at this point. Let’s say,
for example, that you want to roll out your new employee training program, but don’t yet know
what needs to go into it.
You’ll want to look at every single step, from initiation to rollout, so you can get a clear idea of
everyone who will need to be involved. This is what you’ll use to determine timelines.
Some tasks can be completed simultaneously and some cannot begin until another has finished.
Understanding this will help you understand time associated with each step and when the steps
should take place.
This is where software is extremely helpful. It allows you to enter start and end tasks and then
automatically builds out the Gantt chart for you so you can see how long each project will take
It is usually a good idea to include information that will help viewers understand each
component of the project. The downside here is that you want to keep your Gantt chart
uncluttered, and there typically isn’t much room for descriptions, analysis, or recommendations.
Some software solutions make accommodations for this by allowing you to create detail pages
for each component that can be included in the report and navigated to if necessary. (Personally,
we find this incredibly useful for project status meetings.)
Now that everything is organized for you, you can start breaking down your budget for the
project based on milestones. Once you’ve allocated a budget, you should get a more clear idea of
whether you will complete the budget above or below what you’ve anticipated.
Every component of a project should have an owner. When people take ownership of or
responsibility for a task, they’re more likely to ensure that it’s completed on time and it’s of
expected quality. If there are a number of contributors, it’s useful to include their names as
contributors on the Gantt chart.
As time goes on and you’re working through your project, you should be using your Gantt chart
as a reference as much as possible. It will allow you to assess the current status of your different
components and determine what those statuses mean for project completion. This is why the
Gantt chart is so critical to begin with—because having a snapshot view of how everything is
going is very important.
PERT/CPM
In project management, Project Evaluation Review Technique or PERT is used to identify the
time it takes to finish a particular task or activity. It is a system that helps in proper scheduling
and coordination of all tasks throughout the project. It also helps in keeping track of the progress,
or lack thereof, of the project.
A flowchart is used to depict the Project Evaluation Review Technique. Nodes represent the
events, indicating the start or end of the activities. The directorial lines indicate the tasks that
need to be completed, and the arrows show the sequence of the activities.
Float/Slack – Refers to the amount of time a task can be delayed without resulting in an
overall delay to other tasks or the project
Critical Path – Indicates the longest possible continuous path from the start to the end of a
task or event
Critical Path Activity – Refers to an activity without slack
Lead Time – Refers to the amount of time needed to finish a task without affecting
subsequent tasks
Lag Time – The earliest time by which a successor event can follow another event
Fast Tracking – Refers to handling tasks or activities in parallel
Crashing Critical Path – Shortening the amount of time to do a critical task
Identify the different tasks needed to complete a project. Make sure to add these in the
right order and indicate the duration of each task.
Create a network diagram. Use arrows to represent the activities and nodes as milestones.
Determine the critical path and possible hack.
Advantages of PERT
Disadvantages of PERT
Like any other method, PERT comes with its share of limitations:
1. In complex projects, many find PERT hard to interpret, so they also use a Gantt Chart,
another popular method for project management.
2. It can be tedious to update, modify and maintain the PERT diagram.
3. It entails a subjective time analysis of activities, and for those who are less experienced or
biased, it may affect the project’s schedule.
1. Choose a location.
2. Clean the area from trash.
3. Buy paint for marking.
4. Measure the pad for a certain number of cars.
5. Mark and paint all the parking elements.
6. Install the gate.
Knowing the scope of the project, you can divide the work structure into the list of activities,
giving them names or codes. All activities in the project must have a duration and a specific date.
This is the most important step because it gives a clear idea of the links between activities and
helps establish dependencies because some actions will depend on the completion of others.
Once you have determined which actions depend on each other, you can create a network
diagram or a path analysis chart. Using the arrows, you can easily connect activities based on
their dependencies.
Estimating how much time will be spent for each action, you will be able to determine the time
needed to complete the entire project (small projects can be assessed in a few days; more
complex ones require a long evaluation).
The activity network will help you create the longest sequence on the path or the critical path
using the following parameters:
Early Start – the time when all previous tasks are completed.
Early Finish – the nearest start time and the time required to complete the task.
Late Finish – all activities are completed without postponing the deadlines.
Late Start – the last end time minus the time it takes to complete the task.
1. Reduce delays: The Critical Path Method helps identify the most important sequence of
tasks in a project. Managers can use this information to reduce delays by optimizing the
work along the critical path.
2. Visualize dependencies: The CPM depends on listing all tasks associated with a project
and their dependencies. The chart thus created can help you visualize all dependencies
and prioritize tasks accordingly.
TOPIC 4
INFORMATION SYSTEM IN PROJECT MONITORING
Monitoring also involves giving feedback about the progress of the project
to the donors, implementors and beneficiaries of the project.
Project monitoring aids various purposes. It brings out the problems which occur or which might
occur during the implementation of the project and which demands solutions for smoother
progress in the project. Effective monitoring helps in knowing if the intended results are being
achieved as planned, what actions are needed to achieve the intended results during the project
To assess the project results: To know how the objectives are being met and the desired
changes are being met.
To improve process planning: It helps in adapting to better contextual and risk factors which
affect the research process, like social and power dynamics.
To promote learning: It will help you learn how various approaches to participation influences
the outcomes.
To ensure accountability: To assess if the project has been effectively, appropriately and
efficiently executed, so that they can be held accountable.
It is said that projects never go according to what we have planned. Hence, one must be ready to
make any amendments as needed. You can also opt for the following three-step approach:
1. Check and understand the progress of the project: Before starting to re-plan your
project, you should be sure of the current state and status of the work. Setting up a
meeting for the whole team together to get to know about the updates of the current work,
upcoming tasks and issues will be beneficial. Also, recognize the important milestones in
this meeting.
2. Search for and Manage Exceptions: Stay on a look-out for exceptions like risks, issues
and change requests. Open issues will have to be resolved so that roadblocks can be
removed, and a risk mitigation plan will have to be developed.
3. Re-plan the project: You have an idea of how to re-plan the project. The following steps
will help you do so:
Keep the important project documents updated, which includes the project charter.
Share the new plan with the shareholders.
As per the demand, re-assign the work. Communicate with the team members regarding
the new assignments and send automated reminders to them.
As required, make changes on the project site with the updates reports and dashboards.
Project variance analysis is an important technique that allows project teams to constantly
compare planned performance with actual project data. Hence, it assists project teams in
identifying and analyzing deviations in project performance.
Analyzing variances is not difficult, however, it requires a great deal of discipline in data
collection and interpretation.
To begin with, project team identifies deviation in baseline performance. It further establishes
causes of variances and assesses severity of impact. Thereafter, the team implements corrective
actions to restore project performance. Finally, the team proposes preventive actions to avoid
future occurrences.
Project plans change daily as work gets done and you adjust what’s happening to meet the
challenges of the tasks but sometimes we’re also hit with bigger changes.
Here are 7 causes of change on projects – things that will make you review that schedule again
(and again).
1. Stakeholder Changes Their Mind
A stakeholder could change their mind at any point in the project. And they frequently do! If
their new opinion relates to the format or quality of the output of the project then you’ll be
making a change to incorporate their new ideas. Essentially, this is a change to requirements.
The earlier you can get these out of your stakeholders the less impact they will have on the
project overall. While you are still at the requirements elicitation phase they can pretty much
change their minds as often as they like. When you are into build, that’s when it is going to incur
rework and an associated increase in cost and time to make any changes.
2. Regulatory Change
A legislative or regulatory change might even make your project redundant so you could be
faced with closing it down.
3. Poorly Defined Requirements
I’m sure your projects never have poorly defined requirements, do they? Well, over here in the
real world we face that challenge all the time.
If your requirements are poorly set out during the definition phase of your project then it’s going
to impact you later when you move into the development and build stages.
As the uncertainty around requirements is probed by the team doing the work, assumptions will
be challenges and this is likely to result in a change to scope as you define what your key users
actually want.
4. Change in Sponsorship
A new sponsor brings new ideas. Whether your project is changed voluntarily because it’s of
benefit to the project or replaced through resignation or redundancy, whoever is now in charge
will have their own approaches for doing things.
A different leader isn’t always going to mean project changes, but it is something you should
watch out for. And you’ll have to put your managing up skills to the test as you bring them up to
speed with what’s happening on the project.
5. Business Strategy Change
A change in direction could result in changes to the scope or requirements on your project. this
could happen at any point in the project: business strategies are often under constant review for
competitive threats, even if in principle the organisation has published a three- or five-year
strategic plan.
Ultimately, a change to the strategy could result in a major change: your project being closed
down prematurely. This could happen if the project no longer supports the strategic direction and
objectives of the company but more often you’ll be expected to pivot the work to align with a
change in direction.
6. Updated Technology
Technical updates can introduce changes to your project.. This resulted in a change to scope and
it made the overall project longer as there was effectively rework to do. But we all agreed it was
a sensible approach and one that we had seen coming.
7. Not Enough Resources
If you don’t have enough people (or money, or equipment) to do everything you want to then
you might be forced to change the project to get by. For example, if you’re building an estate of
new houses and you run out of time or money towards the end, you might finish off the last few
to a lower spec than the first ones. Top of the range taps? No thanks, just the basic ones will do
fine.
Project reporting is the formalized recording of project progress and (interim) project results.
On the basis of a target/actual comparison of the individual controlling aspects, project
status reports are created and presented to a defined target group. This usually consists of the
project manager, the project client and (if available) the steering committee.
2. Identifies risks
Identifying risks is a key step to better projects. With the right reports, you can spot a risk early
on and take action, or ask your project stakeholder for help. Reporting on risks also makes it
easier for the team to work on the problem.
3. Cost management
Cost management is tricky. But with regular reporting, it’s easy to view your expenditure clearly
and manage your budget with full visibility.
4. Visibility
5. Control
Reporting puts you in control of your project. It allows you to see the progress, stagnation, or
regress of certain elements, how team members are performing, and the quality of work
completed.
6. Learning
Information provided by project reporting on completed tasks can inform future actions. For
example, you may figure out that project communication was an issue and make changes to the
communication plan for your next project.
PROJECT MILESTONES
Milestones act as signposts through the course of your project, helping ensure you stay on track.
Without project milestone tracking, you’re just monitoring tasks and not necessarily following
the right path in your project.
So, when starting a project, milestones can help immensely with scheduling. Milestones are most
commonly found in project management software, and are represented as diamonds in the Gantt
chart feature. Gantt charts are a visual representation of your schedule, laid out on a timeline,
with tasks as points along the path to the successful completion of the project. Milestones divide
this timeline into project phases.
IMPORTANCE OF MILESTONE
Milestones are critical to successful project management for the following reasons:
1. They help to monitor deadlines - setting core milestones in the planning phase of a
project will help project managers to stay on top of all associated deadlines.
2. Identify potential bottlenecks - many projects rely on work produced by external teams or
partners. If these external factors aren't being tracked delays and compression are likely.
3. Easily spot critical dates - using milestones makes it easier to see the bigger picture and
readily spot important dates and events. Perhaps you or your entire team will need to be
out of the office for a mandatory training session related to the project.
4. Raises the visibility of the project - visibility can make things easier when it comes to
project handling. Everyone can see where a project is and what remains to be done.
5. Time and resource allocation - time and resource is critical to the completion of all
successful projects. Using milestones helps managers to distribute resources effectively
so that projects are delivered on time and on budget.
6. Payments to vendors are often based on milestone completion - keep track and time
payments to key suppliers with the completion of milestones.
7. Stakeholder involvement varies between milestones - stakeholders typically become
more involved as a milestone is approached. Use milestones to plan for when
stakeholders should step closer to the project.
8. Accountability - project teams need to see what they are responsible for. Milestones help
everyone to be accountable for the part they play.
TYPES OF REPORTS
a) Timesheet report
A timesheet is a report of employee attendance. In this case, the project team members’
attendance report. It is usually presented in a table of the project name, team member’s
name, date, and hours of attendance columns. The function of this type of report is to
review the productivity level when it is compared with other reports, which include
activity and completion information. Include a brief conclusion at the end of the
timesheet to explain the significant issues.
b) Expense report
An expense report usually includes information on various project-related expenses, such
as travel expenses, supplies, equipment, rents, independent contractor fees, and others.
The function of this report is to review the project costs up to a certain milestone.
Whenever needed, include a description on discrepancies.
c) Project Status report
It is a more comprehensive type of report, which is illustrated with visuals to describe
works completed, schedule variance, cost variance, risks, issues, changes, and decisions.
Present the report short and simple.
d) Project Workload report
This report helps you visualize your team utilization and workload distribution within
your selected projects. The report displays each resource’s assignments and also their
time-offs distributed across calendar days. This is often a color-coded report that helps
quickly identify over allocation issues and drill-down to fix them.
e) Portfolio report
Portfolio report provides an overall “big picture” status information of ongoing project
status and progress indicators like budgets, workloads, and actuals. This report should be
capable of the roll-up of projects by reporting on projects by an organization, customer or
project type. Portfolio reports enable executives to use project data to make business-
related decisions and drive strategy.
f) Milestones report
Include important milestones or deliverables of a project and report them to the sponsor
and the management every time a new milestone is achieved. Include percentages or
visuals to better deliver the information. Also, include information on the expected
delivery dates.
g) Task Completion report
Task completion report should be developed to show the sponsor and the management
that the project is progressing well. Create a summary of the project plan and include the
Project reports are valuable tools to both project teams and stakeholders. It provides several
benefits.
All those involved are able to track the current progress of the project and compare it against
the original plan.
They can identify risks early on, and take corrective action.
It easy for everybody to see expenses and manage the budget with more visibility. In fact,
reporting increases visibility in all aspects of the project, including team performance.
The project manager can be in more control to act on progress, stagnation, regression, team
performance, or quality of work.
Project reports are sources of learning. With enough information, those involved can decide
to stop what is not working, to continue doing what is working, and to consider reviewing the
rest.
Reporting is a process that requires completeness and accuracy. It promotes thoroughness,
and ensures all aspects of the project are covered.
a) e-mail or email is information stored on a computer that is exchanged between two users
over telecommunications. More plainly, e-mail is a message that may
contain text, files, images, or other attachments sent through a network to a specified
individual or group of individuals.
You may find some project managers in your office following the best practice of summarizing the
important points in an email and sending them to the intended audience, even after having a long
telephone call with them on a particular topic. These are project managers who recognize the
importance of writing effective emails in their projects.
1. Email is a free tool. Once you are online, there is no further expense that you need to
spend on in order to send and receive messages.
1. Email could potentially cause information overload. Some messages may be dismissed or
left unread, especially if there are a lot coming in and the network has not integrated
some sort of email alert system into the computers at work.
2. Email lacks a personal touch. While some things are better off sent as written and typed
messages, some things should be verbally relayed or written by hand in a note or letter.
3. Email can be disruptive. Going through each email can be disruptive to work as it does
require a bit of time. This disruption is decreased through the utilization of an email alert
system.
4. Email cannot be ignored for a long time. The thing with email is that it needs constant
maintenance. If you ignore it, more and more messages will enter your inbox until it gets
to the point that your inbox is no longer manageable.
5. Email can cause misunderstandings. Because email does not include nonverbal
communication, recipients may misinterpret the sender’s message. This is particularly
true of senders fail to go through their messages before they send them.
6. Email messages can contain viruses. It’s best to be aware of this possibility so that you
are careful when opening messages from people you don’t know, or when downloading
attachments.
File sharing is the practice of sharing or offering access to digital information or resources,
including documents, multimedia (audio/video), graphics, computer programs, images and e-
books. It is the private or public distribution of data or resources in a network with different
levels of sharing privileges.
File sharing can be done using several methods. The most common techniques for file storage,
distribution and transmission include the following:
File sharing is a multipurpose computer service feature that evolved from removable media via
network protocols, such as File Transfer Protocol (FTP).
Operating systems also provide file-sharing methods, such as network file sharing (NFS). Most
file-sharing tasks use two basic sets of network criteria, as follows:
Peer-to-Peer (P2P) File Sharing: This is the most popular, but controversial, method of
file sharing because of the use of peer-to-peer software. Network computer users locate
shared data with third-party software. P2P file sharing allows users to directly access,
download and edit files. Some third-party software facilitates P2P sharing by collecting
and segmenting large files into smaller pieces.
File Hosting Services: This P2P file-sharing alternative provides a broad selection of
popular online material. These services are quite often used with Internet collaboration
methods, including email, blogs, forums, or other mediums, where direct download links
from the file hosting services can be included. These service websites usually host files to
enable users to download the
The primary role of database administration is to ensure maximum up time for the database so
that it is always available when needed
MySQL
SQL Server
Oracle
dBASE
FoxPro
Database Management, allows a person to organize, store and retrieve data from a computer.
Database Management can also describe, the data storage, operations and security practices of
a Database Administrator (DBA), throughout the life cycle of the data. Managing a database
involves designing, implementing and supporting stored data, to maximize its value. Database
Management Systems, according to the DAMA DMBOK, include various types:
Centralized: all the data lives in one system in one place. All users come to that one system to
access the data.
Distributed: Data resides over a variety of nodes, making quick access possible. “Rather than
rely on hardware to deliver high-availability, the Database Management software…is designed to
replicate data amongst the servers” allowing it to detect and handle failures.
PREPARED BY HOD BUSINESS KURGATT Page 39
Federated: Provisions data without additional persistence or duplication of source data. It maps
multiple autonomous databases into one large object. This kind of Database Architecture is best
for heterogenous and distributed integration projects. Federated Databases can be categorized as:
Loosely Coupled: Component Databases construct their own federated schema and typically
requires accessing other component database systems through a multi- database language.
Tightly Coupled: Component systems use independent processes to construct and publish
into an integrated federal schema.
Blockchain: A type of federated database system used to securely manage financial and other
types of transactions.
Advantages of DBMS
Disadvantage of DBMS
Cost of Hardware and Software of a DBMS is quite high which increases the budget of
your organization.
Most database management systems are often complex systems, so the training for users
to use the DBMS is required.
In some organizations, all data is integrated into a single database which can be damaged
because of electric failure or database is corrupted on the storage media
Use of the same program at a time by many users sometime lead to the loss of some data.
DBMS can't perform sophisticated calculations
Types of databases
Depending upon the usage requirements, there are following types of databases
available in the market:
1. Centralised Database
The information(data) is stored at a centralized location and the users from different
locations can access this data. This type of database contains application procedures
that help the users to access the data even from a remote location.
Various kinds of authentication procedures are applied for the verification and validation
of end users, likewise, a registration number is provided by the application procedures
which keeps a track and record of data usage. The local area office handles this thing.
Just opposite of the centralized database concept, the distributed database has
contributions from the common database as well as the information captured by local
computers also. The data is not at one place and is distributed at various sites of an
organization. These sites are connected to each other with the help of communication
links which helps them to access the distributed data easily.
3.Personal Database
Data is collected and stored on personal computers which is small and easily manageable. The
data is generally used by the same department of an organization and is accessed by a small
group of people.
4.End User Database
The end user is usually not concerned about the transaction or operations done at various levels
and is only aware of the product which may be a software or an application. Therefore, this is a
shared database which is specifically designed for the end user, just like different levels’
managers. Summary of whole information is collected in this database.
8.Relational Databases
These databases are categorized by a set of tables where data gets fit into a pre-defined category.
The table consists of rows and columns where the column has an entry for data for a specific
category and rows contains instance for that data defined according to the category. The
Structured Query Language (SQL) is the standard user and application program interface for a
relational database.
There are various simple operations that can be applied over the table which makes these
databases easier to extend, join two databases with a common relation and modify all existing
applications.
Information systems security, more commonly referred to as INFOSEC, refers to the processes and
methodologies involved with keeping information confidential, available, and assuring its integrity.
Information vulnerabilities
A vulnerability is that quality of a resource or its environment that allows the threat to be
realized.
When your computer is connected to an unsecured network, your software security could be
compromised without certain protocols in place. Forgetting updates, product weakness and
unresolved developer issues leave your clients wide open to computer security vulnerabilities.
Here is a list of several types of vulnerabilities that compromise the integrity, availability and
confidentiality of your clients' products.
Threats
Critical errors in your clients' computer software can leave data in the entire network vulnerable
to a number of malicious threats, including:
Malware
Phishing
Proxies
Spyware
Adware
Botnets
Spam
Cyber attackers, hackers and malware can take over your clients' software, disable it and steal
data. How does this happen?
The list grows larger every year as new ways to steal and corrupt data are discovered.
Staying on top of bandwidth usage with alerts when devices exceed thresholds
Blocking users from visiting suspected and confirmed unsafe sites
Setting white lists and black lists to override category based filters
Applying Web Bandwidth checks
Filtering Internet activity by day, category and URL to reveal trends, spikes and
irregularities
Completing with detailed reporting tools to let you analyze browsing activity and
demonstrate the effectiveness of web security
Identifying risks with our iScan Online software to tell you where it is and places a dollar
value to the risk of it being there Protect your clients' data. Start a free trial today.
Steps that all organizations should take to mitigate these threats and protect important company
data:
Information Systems controls are a set of procedures and technological measures to ensure secure and
efficient operation of information within an organization. Both general and application controls are used
for safeguarding information systems.
General Controls
These controls apply to information systems activities throughout an organization. The most
important general controls are the measures that control access to computer systems and the
information stored or transmitted over telecommunication networks. General controls include
administrative measures that restrict employee access to only those processes directly relevant to
their duties, thereby limiting the damage an employee can do.
1. Software Controls – Monitor the use of system software and prevent unauthorized access of
software programs, system failure and computer programs.
2. Hardware Controls – Ensure the computer hardware is physically secure and check for
equipment malfunctions. Computer equipment should be specially protected against extreme
temperatures and humidity. Organizations should make provisions for backup or continued
operation to maintain constant service.
4. Data Security Controls – Ensures critical business data on disk and tapes are not subject to
unauthorized access, change or destruction while they are in use or in storage.
5. Implementation Controls – Audit the system development process at various points to ensure
that the process is properly controlled and managed.
Application Controls
Application controls are specific to a given application and include measures as validating input
data, regular archiving copies of various databases, and ensuring that information is disseminated
only to authorized users.
1. Input Controls – Input controls check data for accuracy and completeness when they enter
the system. There are specific input controls for input authorization, data conversion, data editing
and error handling.
2. Processing Controls – Processing controls establish that data are complete and accurate
during updating. Run control totals, computer matching, and programmed edit checks are used as
processing controls.
3. Output Controls –Output controls ensure that the results of computer processing are accurate,
complete and properly distributed.
A thoroughly conducted audit program can assure organizational stakeholders of the financial,
operational and ethical well-being of an organization. It should confirm the effectiveness of
current operations and on-going compliance with administrative or legal regulations. Or it can
reveal the need for change or urgent action.
TOPIC 9
INFORMATION SYSTEMS SOFTWARE SELECTION
Enterprise software implementation is a big deal. Most enterprise software projects can take
many person-years of effort and have a large price tag. Many companies find that they require
expertise from third parties like software vendors, system integrators and subject matter experts
(SMEs) to round out their team.
Yet many organizations have more clearly defined selection criteria for smartphones – a small
purchase – than for enterprise software. If you need a system integrator or implementation
consultant, how do you select the right one? Beyond finding a firm that appears to have the right
resources to meet your needs, consider the following six essential selection criteria.
1. Business and industry expertise
Enterprise IT projects can impact the entire business. Your system integrator or implementation
consultant (aka "the firm") should bring more to the table than IT skills and subject matter
expertise.
How well does the consulting firm’s leadership understand the position of the business in a
global market?
Do they demonstrate knowledge of your industry, the subject matter and best practices?
2. Market knowledge
Understanding your business and IT needs is a given. To be most effective, they must also know
about the software market, to help you arrive at a solid "short list" of vendors.
Does the firm understand which solutions can best meet your needs?
Do they have solid contacts within the software market niche (e.g., financials, HR, EHS, asset
management)?
Do they understand the strengths and weaknesses of key competitors within that niche?
3. Program/project management capabilities
Program/project management goes well beyond a GANTT chart.
Can the firm help you navigate the entire systems lifecycle if needed?
Have they demonstrated the ability to manage large, complex efforts?
Do they possess the skills to clearly define and manage the project scope, schedule and budget?
Can they manage scope creep, at the same time making critical changes when necessary?
4. Methodology
A good methodology and clearly defined deliverables can keep the effort on track, while the lack
of a clearly stated methodology raises a red flag.
Does the firm have a methodology that has proven successful on other projects?
What are the primary technical and project management approaches?
What methodology and tools do they employ?
What are the main deliverables?
Can the firm show examples of completed work products?
What do their clients say about the efficacy of the firm's methodology and tools?
5. Communications
Assume that scope changes and issues will arise throughout the systems lifecycle. What’s not
always so clear is how to manage these changes.
Does the firm have the business savvy and communication skills to identify issues that others
may miss?
PREPARED BY HOD BUSINESS KURGATT Page 52
Will they communicate critical issues to key stakeholders before the issues have a large impact
on scope schedule, and budget?
Will they recommend solutions and help you to make sound decisions?
6. Independence and objectivity
Enterprise software initiatives can span months or years, so it is important to find a firm that has
your best interests in mind. This is where independence and objectivity play an important role.
Does the firm have your best interests in mind, or are they more interested in billable hours and
keeping consultants off the bench?
Is the firm independent? Are they allied with one or more software vendors?
Are they good listeners?
Do they have a "one size fits all" mindset, or can they be objective about your initiative?
Can you trust their advice?
Will they tell you when you are about to make a bad decision?
You can enhance your organization’s chances for success by developing – and applying –
objective system integrator/consultant selection criteria. My previous blog post provided six tips
for making the selection.
There are many factors that impact the project delivery, including the speed of technological
changes and the level of competition in the market.
Challenge 1: Extremely high competition
If your software company has a great idea, chances are another company has already thought of
it. The competition is extremely high both at the local and international levels, and it affects
software businesses in terms of pricing, customer reach and retention, etc. PMs have to work
closely with business owners and other stakeholders to identify the right market segment and
ensure the ROI of their software.
Challenge 2: Old legacy systems
Software companies often spend significant resources on maintaining and upgrading the old
legacy systems. Having invested a lot of financial and human resources, stakeholders become
resistant and don’t want to change the existing system, even when it no longer meets their needs.
1) Takeoff software
This allows you to measure lengths, areas and volumes from digital files (such as CAD
drawings) or blueprints. Planswift and ProEst some of the software that enable you to perform
take off electronically – saving you the hustle of keeping paper records.