Delivery in day(s): 4
Project Management Proof Reading Service
Every business organisation has its vision and mission statement. In order to meet them, organisation formulates objectives and goals. To achieve these goals organisation divide them on a smaller scale and achieve them through projects. According to Bodicha (2015), Project management is a tool for organisations to execute projects effectively. Grand Wines Limited has same requirement to develop and brings latest technology in the business activity for gaining competitive advantage. Project Management Plan is documentation of project which shows planning of different activities covered under project in detailed form. Presently, Grand Wines Limited is facing problems related to meeting customer's order in time and sometimes orders are entered in sales data base of company incorrectly due to human errors. In order to meet these discrepancies CEO of Grand Wines Limited wants to develop and frame a project plan to improve order systems, delivery speed and accuracy in data entry.
1.Scope of Management Plan:
Scope of the management plan is required to ascertain before developing project for the operational benefit of company. Here, company is facing problems related to delivery system and sales entry in data base of the company. Scope helps in defining objectives of the project in quantifiable terms. Scope of management plan helps in determining requirements for implementing the projects, whether internal sources are available with company or there is need of outside source to procure the requirement of company. Deliverables and Scope verification process are also the part of scope of the future project (Turner, 2017).
According to Chow, et. al. (2014) Deliverables include those actions or activities which project team wants to deliver the project. Deliverables are those outcomes which will be received after implementing the project. Deliverables are used as milestone to measure the actual outcomes. Deliverables for this project is includes:
1. Develop a wireless data entry device.
2. Resolving the problem of error in entering orders of customers in database.
3. Regular updating about the inventory level to sales representatives.
4. Timely completing customer orders.
According to Ofori (2013), application of knowledge, skills tools and techniques are to meet project requirement. To accomplish this project, requirements are as follows:
In scope and Out scope items:
In scope items are include those items which are internally available in the company for project. This item covers sales representatives and computer systems of the company. Out scope items are those which will be managed by the come from outer sources like hiring services of IT professionals, purchasing of system software and internet services from Internet service provider. For determining project scope
Scope Verification Process:
After identifying wide scope of project through requirements, in scope and out scope items and deliverables of project. A process is established by project manager to ensure that scope covers all important aspect which is helping in meeting the objectives for the company.
2.Work Break down Structure:
After conducting market research and assessing internal requirement deliverables are decided. Now, next process will start which include breaking down the whole project work into small task or steps to accomplish project effectively. Work-Break-Down (WBS) structure either may be in free form or chart form. To meet the deliverables in the project WBS is framed in organisation chart format (Hans,2013).
According to Devi & Reddy (2012), a complex project becomes manageable by work break down structure. As a project manager to accomplish the project by efficient and effective use of resources Work Break down structure of all the activities are necessary. The whole project is divided into four phase.
Planning:First is planning phase, Planning is started after extensive market research and internal access of requirement. After assessing it is found that company is required to develop a wireless system which is benefited for company's operations and also it brings new technology in business which are used by competitors in the market for gaining competitive advantage. Planning includes deciding deliverables of the project then on the basis of this Scope of the project will be identified. On the basis of scope and deliverables for further planning, requirement should be accessed. To achieve deliverables of the project company will require hiring professionals like data administrative officer and software developer etc. Who will be helping in developing and implementation of wireless devices?
Developing:After assessing functional and non- functional requirement, Company will arrange all the resources like financial and human resources etc and also complied another requirement. After planning next step is, developing structure for completing the project. Developing includes set computer system and purchase wireless devices for sales representatives. To make the systems workable system software is required to be developed by IT professionals who are hired by project manager.
Implementation: After make arrangements of systems and operators, the next step is implementation. Under this, wireless devices will be distributed to sales personals and computer systems are set up in the central sales department. IT professional create a local domain which can be used by staff of central sales department and sales representatives with the help of User ID and password. The system is readable and writable for staff of central sales department only for security purpose. IT professionals also develop security software like Firewall for making security against ex- employees of company and hackers.
Outcome:Outcome of the implementation of project will show whether deliverables are met or not. The developed system reduces the delivery time and customers will be very comfortable and satisfied with the services of company. Sales representatives will also have correct information about inventory position also and there will be no default in entering the sales order for central sales department.
3. Gantt chart
Project schedule includes presentation of description of all activities carried out for completing the project in tabular format. Project Schedule includes milestones, activities and deliverables with start and end dates (Rao & Chaitanya, 2015).
Project Presentation & CEO approval
Set up System
System feature amendments
Gantt Chart- of Project Schedule(Villalobos, et. al., 2011)
Critical Path of the project plan:
Project Presentation & CEO approval
Set up System
System feature amendment
CALCULATION OF CRITICAL PATH AND MINIMUM DURATION
Critical Path Method:
As per shown in network diagram there four ways to complete these project. Critical path of the project is taken 135 days to complete the project and remaining path number 2, 3, 4 is non-critical path activities whereas path 3 takes minimum time of 75 days to accomplish the activity.
4.Time Phased Budget:
Salaries to technical staff
Purchase computer system
Set up system
(for 6 months)
Time-phased budgeting means preparing budget by allocating time period allocating cost for that specified time period. Time-phased budget helps in identifying expenditure incurred on its sources during specified time period. The above budget stated the approximate values of cost, which may incur from planning phase to implementation phase. It may be possible that some Known or unknown event may incur in future. The budget also covers these events. For example, it may be possible that technical staff may demand more remuneration for this AUD 600 is included in the budget. It may be possible that prices of computer devices may go down or increase Budget included covered these unknown events. Budget is only helpful for estimating the future cost so it covers all the major events which may affect the cost or expenditure of the company. Budget includes variable cost like salaries and preliminary expenses etc. and fixed cost like purchase of computer system and software etc. (Sokri, A., 2012).
Risk register is a document which includes all the probable risk related to the future conditions of the project. Generally, it is prepared at the planning and development stage of the project. Maintain risk register is necessary requirement because it provides information about the nature of risk and its probability (Saffin & Laryea, 2012). Risk register helps in tracking issues or problems and make plans to reduce their impact.
Project Plan includes development of wireless data entry device, this overall related with information technology and its devices. During the planning session of project various risks are identified which includes security essentials, system updating, staff retention and encryption breach etc. Risk always has probability of their occurrence. Probability of risk may be high, medium or low.
Security Essential: Probability is very high regarding the security issues of wireless devices. Security is a factor which is important and essential regarding devices operating through wireless and internet network. Security aspect can be arises from hackers, customers or ex- employee of the company. The manager has to take decision regarding local or global domain while creating user id which is used in accessing the inventory position by the sales representatives.
System Updating: Probability of such risk is medium but manager has to consider this while developing wireless system. Systems are existence for a particular time frame so, time to time updating is required. Default in system updating may bring a risk regarding system failure in future and may destroy present information.
Staff Retention: It is a very serious problem. It may be possible that IT professionals who will be hired by the company may drop their job in future. The wireless system wholly depends upon IT professionals because they are fully responsible for keeping the system update and maintaining security fire wall on it. So, staff retention is a severe risk which company may face. So reduce its probability company may have to take care its employees.
Encryption Breach: Encryption is a process where information is converted into coded language to prevent information from unauthorised access. Encryption is good and beneficial for system security. A strong encryption key should be developed to transform clear text data into coded language. Yet, there will be probability of encryption breach but it is hard to breach such coded language (Uzulans, 2015).
This assignment includes a project plan which is developed by “Grand Wines Limited”. As it faces problems in completing delivery of consumer order on time and error during entering the sales orders by the sales department. This report includes project plan of developing wireless used for data entry. The project plan includes developing deliverables on the basis of scope inputs and market research, work break down structure, Gantt chart planning schedule, Critical path method and time-phased budgeting.
Bodicha, H. H., 2015, “How to Measure the Effect of Project Risk Management Process on the Success of Construction Projects: A Critical Literature Review”, The International Journal Of Business & Management, Vol 3, pages 99-112.
Chow, A. F., Woodford, K. C. & Lambe, N., 2014, “Using Project Deliverables and Project Management for Timely Completion of Student Projects”, Journal of Emerging Trends in Economics and Management Sciences, pages 323-329.
Devi, T.R. & Reddy, V.S., 2012, “Work Breakdown Structure of the Project”, International Journal of Engineering Research and Applications, Vol. 2, pages 683-686.
Hans, R.T., 2013, “Work Breakdown Structure: A Tool For Software Project Scope Verification”, International Journal of Software Engineering & Applications, Vol.4, pages 19-25.
Ofori, D. F., 2013, “Project Management Practices and Critical Success Factors–A Developing Country Perspective”, International Journal of Business and Management, Vol. 8, pages 14-31.
Rao, B. P. & Chaitanya, K. M., 2015, “Resource Constrained Project Scheduling Problems - A Review Article”, International Journal of Science and Research, pages 1509-1512.
Saffin, T. & Laryea, S., 2012, “The use of risk registers by Project Managers”, In: Laryea, S., Agyepong, S.A., Leiringer, R. and Hughes, W. (Eds) Procs 4th West Africa Built Environment Research (WABER) Conference, pages 1307-1320.
Sokri, A., 2012, “Weibull-based Time-phasing of Budget Expenditures”, Defence R&D Canada – CORA, pages 1-36.
Turner, J. R., 2017, “Project Management”, International Journal of Project Management, pages 1-13.
Uzulans, J., 2015, “Project Risk Register Analysis and Practical Conclusions”, Project Risk Register Analysis and Practical Conclusions, vol. 4, pages 1-9.
Villalobos, J. P. C., Sanabria, S. P. J. & Caceres, R. G. G., 2011, “Activity scheduling through gantt charts in an ms excel spread sheet”, pages 95-109.