2project And Change Managementyour Nameinstitutioncourse Titlen ✓ Solved

2 Project and Change Management [Your name] [Institution] [Course title] [Name of Professor] [Date of submission] Contents Step 1: Define Business Need and Approach 3 Step 2: Analyse Information Environment 4 Step 3: Assess Data Quality 4 Step 4: Assess Business Impact 4 Step 5: Identify Root Causes 5 Step 6: Development Improvement Plans 5 Step 7: Prevent Future Data Errors 5 Step 8: Correct Current Data Errors 6 Step 9: Implement Controls 6 Step 10: Communicate Actions and Results 6 References 8 Step 1: Define Business Need and Approach Organize and settle the issues that are the focal point of the undertaking. Depict the elevated level data condition Data, forms, individuals/associations, and innovation.

Get the task off on the correct foot. ABC Company must guarantee that the task has an incentive to the business. Explain the venture concentrate and concur on anticipated outcomes. Give the underlying elevated level depiction of the data condition and build up the task and the methodology for settling issues. ABC Company should utilize the accompanying instruments and methods: • A prioritization method that works for you. • Organization graphs. • Interview and research. • Benefit versus Cost Matrix. • Results from vital arranging forms. • Project the executive's rehearses.

ABC Company will get an astonishing yield in type of away from and documentation of the business issue and the relationship to IQ. A depiction of the significant level information, procedures, individuals, and innovation identified with issues. A fitting task plan. For New Projects you'll get, Project sanction, setting outline, work breakdown structure, timetable, and asset gauges. For Existing Projects, incorporate how appropriate IQ undertakings will be coordinated into the task plan.

An underlying correspondence plan (Cross & Lynch, 1988). Step 2: Analyse Information Environment Assemble, arrange, and dissect information about the present information condition fitting degree of detail for necessities, data and particulars, forms, individuals/organizations, and innovation Document the existence pattern of the information related with the business issue. Build up the underlying arrangement for catching and surveying the data. Guarantee that the data to be evaluated are the data related with the business issue. Give an establishment to every single other advance and exercises all through The Ten Steps process (Rodràguez-Elias et al., 2008) Step 3: Assess Data Quality Survey and assess data quality for measurements relevant to the issues.

Recognize the sort and degree of the data quality issues. Give a premise to Root source examination, required data rectifications just as suitable upgrades to forestall future mistakes. ABC Company will accomplish the accompanying outcomes by get to data quality Data quality evaluation results like documentation of Potential effect on the business. Conceivable underlying drivers and starting suggestion for activity dependent on data quality evaluation results. Fundamental communication finished, alongside refreshed communication plan (Pipino et al., 2002).

Step 4: Assess Business Impact Build up the effect on the matter of data quality issues. Both subjective and quantitative measures can be utilized. Build up the business case for IQ improvement. Increase support from the executives for IQ ventures. Decide suitable interests in your information assets, for example, required data rectifications and enhancements to forestall future blunders (Atyam, 2010) Step 5: Identify Root Causes Recognize and organize the genuine reasons for IQ issues.

Create suggestions for tending to the underlying drivers. ABC Company must guarantee that proposals and future improvement plans centre around the genuine reasons for data quality issues (Rooney & Heuvel, 2004). Explicit proposals for tending to underlying drivers of IQ issues with supporting documentation. Explicit proposals and following stages dependent on business sway results with supporting documentation. Vital communication finished, alongside refreshed communication plan.

Step 6: Development Improvement Plans Build up an action plan dependent on the suggestions from the data quality as well as business sway appraisal results and from main driver investigation. Guarantee that the data quality appraisal and business sway results and proposals are transformed without hesitation plans. Action plans for tending to main drivers, forestalling IQ issues, and remedying data mistakes are improvement exercises not requiring an undertaking. Plans for extra ventures or little scope pilots to execute changes. Individuals/Orgs affected by the action plans.

Communication for "selling" the changes. Any extra communications alongside refreshed communication plan of ABC Company (Caffyn, 1999) Step 7: Prevent Future Data Errors Execute accurate solutions that address main drivers of the data quality issues. Keep future data blunders from happening by managing the reasons for those mistakes and execute suitable improvement plans. Guarantee that the interest in tidy up or remedy of current blunders isn't squandered. The aftereffects of forestalling future data blunders at ABC Company will be answers for tending to main drivers and forestalling future data mistakes.

Reported changes to the business that outcome from the upgrades actualized. Preparing of work force influenced by changes, new jobs/duties, new procedures, and so forth. Changes and their outcomes recorded for future clients, and victories imparted. Fundamental communication finished, alongside refreshed communication plan (Cheldelin & Ishii, January) Step 8: Correct Current Data Errors Execute arrangements that right the current data errors. Right existing data errors that are messing up the business.

Data will be adjusted by determinations and essential communication finished, alongside refreshed communication plan (Zhao & Olivera, 2006). Step 9: Implement Controls Execute progressing checking and measurements. Screen and check the enhancements that were actualized. Ensure new arrangements have fitting data quality controls. Decide whether the improvement actions accomplished the ideal impact.

Keep up upgrades by normalizing, reporting, and ceaselessly checking them. Support ceaseless improvement and abstain from coming back to old procedures and practices. Controls are actualized now and important communication complete alongside refreshed communication plan (Oppliger et al., 2000). Step 10: Communicate Actions and Results Convey results and progress as suitable all through the venture. Instruct about and bring issues to light of the significance and effect of data quality to the business.

Acquire and continue the executives support all through the task. Give deceivability to and keep up help from every one of those affected by the undertaking. Get and keep up help for coming about action plans and enhancements. Show victories. Communication plan and calendar.

Introduction and preparing materials. Communications finished dependent on course of events and communication plan (Montgomery et al., 2013). References Cross, K. F., & Lynch, R. L. (1988).

The “SMART†way to define and sustain success. National productivity review , 8 (1), 23-33. Rodràguez-Elias, O. M., Martànez-Garcàa, A. I., Vizcaàno, A., Favela, J., & Piattini, M. (2008).

A framework to analyze information systems as knowledge flow facilitators. Information and Software Technology , 50 (6), . Pipino, L. L., Lee, Y. W., & Wang, R.

Y. (2002). Data quality assessment. Communications of the ACM , 45 (4), . Atyam, S. B. (2010).

Effectiveness of security control risk assessments for enterprises: Assess on the business perspective of security risks. Information Security Journal: A Global Perspective , 19 (6), . Rooney, J. J., & Heuvel, L. N.

V. (2004). Root cause analysis for beginners. Quality progress , 37 (7), 45-56. Caffyn, S. (1999). Development of a continuous improvement selfâ€assessment tool.

International Journal of Operations & Production Management . Cheldelin, B., & Ishii, K. (2004, January). Mixed-model assembly quality: an approach to prevent human errors. In ASME 2004 International Mechanical Engineering Congress and Exposition (pp. ). American Society of Mechanical Engineers Digital Collection.

Zhao, B., & Olivera, F. (2006). Error reporting in organizations. Academy of Management Review , 31 (4), . Oppliger, R., Pernul, G., & Strauss, C. (2000). Using attribute certificates to implement role-based authorization and access controls.

Sicherheit in Informationssystemen (SIS 2000) , . Montgomery, S. V., Barsevick, A. M., Egleston, B. L., Bingler, R., Ruth, K., Miller, S.

M., ... & Daly, M. B. (2013). Preparing individuals to communicate genetic test results to their relatives: report of a randomized control trial. Familial cancer , 12 (3), . Hello class, It is so important for protective services to gain as much knowledge about their adversaries as possible.

Knowing who and what poses a threat to the principal can provide a huge tactical advantage to the security team. On page 79 of the Protective Operations textbook, there are 3 important pieces that need to come together for a more accurate risk assessment; asset identification, vulnerability assessment, and a threat assessment. Identifying assets encompasses anything that has value owned by a company, including personnel. Vulnerability assessment is just that; security professionals identifying the greatest weaknesses in defense and formulating a plan to reduce the risk. Lastly, a threat assessment should describe the ability of the enemy to attack and how the attack would most likely be carried out.

A risk assessment is a lot like playing a game of chess where you try to predict where your opponent will move their pieces next so you can be on step ahead of them. In the age of the internet and social media, people have become their own worst enemy in terms of security. People willingly give up their own personal information on social media, such as where they work, who is in their family, what hobbies they have, and even more personal information such as relationship status. All of this information can be used against someone in order to breach security measures and cause harm. In our lesson reading this week under the section Potential Online Sources for Intelligence, public records that are stored in databases online are also a way for criminals to find out more information about the principal to form a plan of attack.

On the reverse perspective, the internet can also be used by security professionals to collect intelligence about their adversaries and develop a more solid protective strategy to keep the principal safe. -Trevor Class, During this week's lesson, we had to speak about the various online sources used to collect intelligence from both a protection point of view and an adversary point of view. Lastly, we were asked to explain what a design basis risk management and assessment model is. With the introduction of the world wide web in the late 90s, the world became connected overnight. Add to this the creation of the social media boom with online platforms such as Instagram, Facebook, and YouTube. People use these platforms to connect with loved ones, for employment purposes, dating, etc.

Adversaries can also use these platforms to recruit individuals into their organizations and share photos/videos after an attack to advance their cause further. Protection personnel can use social media platforms to learn about the specific area their principal may be visiting. For example, conducting social media visits and using particular hashtags may reveal specific vulnerabilities in the area, any potential route hazards, or any general unrest that may be occurring in the area. An adversary may utilize the same social media platforms to seek out soft targets, learn the pattern of life for a specific individual, or seek out an area of civil unrest to introduce fear further. One social media example that could use to benefit both the adversary and the protection detail is "geotagging." Geotagging is a feature built into most mobile phones' day that allows one to quickly organize all photos based on specific locations on a map.

The risk from geotagging occurs with social surveillance. By using the available information found on social media, adversaries can track your daily habits. This information can then be used to develop a life pattern such as favorite restaurants, routes to and from work, or potentially home addresses. "The mission of the Design-Basis Risk Management/Assessment Model is to determine the potential for a specific and limited number of unwanted events to occur, such as a targeted killing or kidnapping, and to develop an appropriate response in advance" (McGovern, 2011). The three components are asset identification, vulnerability assessment, and threat assessment.

During the first stage of asset identification, it is essential to identify all things of value. Vulnerability assessments are conducted to detect ways for an adversary to exploit a potential situation to attack the asset/resource. The final stage of the design basis risk model is the threat assessment. During this stage, all details of the adversary are explored to determine the capabilities of the adversary. Nick McGovern, G. (2011).

Protective Operations: A Handbook for Security and Law Enforcement. Retrieved from Hello class, I hope everyone is having a good week. This week’s post compares the laws surrounding strategies dealing in the Maritime Transportation Security Act of 2002, The SAFE Port Act, and The Small Vessel Security Strategy. These are the federal security measures mandated to provide security at port facilities to maintain operations. As shown in the reading coastal security is broken into 3 sections: · Physical structures, transportation systems and materials · Human assets · Cyber Infrastructures, data, information storage With that being said the Maritime Transportation Security Act MTSA of 2002 was developed to increase the level of security for the nation’s ports.

This policy was put into act after 9/11 so the Coast Guard could regulate facilities in vessels in US jurisdiction. The Department of Homeland Security under guidelines established by President Bush’s administration in 2002 to enhance security strategies. This policy provides the Coast Guard with an ability to do unannounced spot checks at least once a year. While the authority and ability to asset threats to critical infrastructures align with the growth of FSA Facility Security Assessment to inspect and evaluate critical assets and potential threats. Therefore, the tactics in this legislation are designed to protect the nation's ports and waterways from a terrorist attack (DHS, 2002).

The SAFE Port Act of 2006 was developed to make sure the nations ports stayed secure from maritime transportation terrorism. This policy was put into act to strengthen efforts already put into effect. Enabling custom agents, the ability to check cargo with technology without opening containers before they were brought into the port. Therefore, safeguarding our ports by deploying agents to foreign ports in different countries to check cargo. where to deter the efforts of terrorists trying to smuggle devices into the country. Finally giving the federal government the authority to control waterways surrounding the country key to improving borders.

Advances in port security since 2006 were made possible through public and private collaboration as new security measures became part of doing business in the maritime environment (Willis, 2016). With that the policy involving Small Vessel Security refers to the risk that small vessels may be used in the smuggling of materials. As found in DHS Gov the goal of this strategy is to enhance maritime security with a layered approach. To hopefully deter terrorists from using small vessels partnerships with public and private sector communities are needed. Has found any other policies advancement in technology to the tech possible threats on small vessels is important.

Risk should be managed through a sharing of information across federal, state, local and private sector partners (2019). Each sector draws from their own approach on detecting and deterring possible threats. Strategies that range from sending agents into foreign lands too pre-scan freight. As well as designing frameworks around improving public as well as private collaborations. All three of these policies are constantly evolving driving tactics used by federal agencies to protect such a vast region of our borders.

DHS. (2019, November 04). Written testimony OF plcy, Uscg, CBP, Tsa, FEMA for a Senate Committee on Homeland security and Governmental Affairs Hearing titled "Evaluating port Security: Progress made and Challenges Ahead". Retrieved February 19, 2021, from DHS, D. (2002). Protecting america’s ports. Retrieved February 19, 2021, from National archives and Records Administration. (2006).

Retrieved February 19, 2021, from Small vessel security strategy. (2019, April 16). Retrieved February 19, 2021, from Willis, H. (2016, April 06). Ten years after the safe Port Act, Are America's Ports Secure? Retrieved February 19, 2021, from Since the 9/11 attacks, Congress has established a new port security framework--much of which was set in place by the Maritime Transportation Security Act (MTSA). Enacted in November 2002, MTSA was designed, in part, to help protect the nation's ports and waterways from terrorist attacks by requiring a wide range of security improvements.

Among the major requirements included in MTSA were conducting vulnerability assessments for port facilities and vessels, developing security plans to mitigate identified risks for the national maritime system, ports, port facilities, and vessels, developing the Transportation Worker Identification Credential (TWIC), a biometric identification card to help restrict access to secure areas to only authorized personnel, and establishing of a process to assess foreign ports, from which vessels depart on voyages to the United States. The Department of Homeland Security, itself a creation of the new security environment brought on by the 9/11 attacks--administers much of this framework, which also attempts to balance security priorities with the need to facilitate legitimate trade.

The SAFE Port Act, which was enacted in October 2006, is one of the latest additions to this port security framework. The act made a number of adjustments to programs within this framework, creating additional programs or lines of effort and altering others. The SAFE Port Act created and codified new programs and initiatives, and amended some of the original provisions of MTSA. The SAFE Port Act included provisions that codified the Container Security Initiative (CSI) and the Customs-Trade Partnership Against Terrorism (C-TPAT), two programs administered by Customs and Border Protection (CBP) to help reduce threats associated with cargo shipped in containers, required interagency operational centers where agencies organize to fit the security needs of the port area at selected ports, set an implementation schedule and fee restrictions for TWIC, required that all containers entering high volume U.S. ports be scanned for radiation sources by December 31, 2007, and required additional data be made available to CBP for targeting cargo containers for inspection. This statement summarizes our recently completed and ongoing work for this committee on these areas.

Paper for above instructions


[Your Name]
[Institution]
[Course Title]
[Name of Professor]
[Date of Submission]

Contents


1. Step 1: Define Business Need and Approach
2. Step 2: Analyze Information Environment
3. Step 3: Assess Data Quality
4. Step 4: Assess Business Impact
5. Step 5: Identify Root Causes
6. Step 6: Develop Improvement Plans
7. Step 7: Prevent Future Data Errors
8. Step 8: Correct Current Data Errors
9. Step 9: Implement Controls
10. Step 10: Communicate Actions and Results

Step 1: Define Business Need and Approach


To initiate a successful project, understanding the business need is paramount. ABC Company must clearly define the project objectives and how these align with the broader organizational goals. The project must be formulated using a combination of tools including prioritization methods, organizational charts, interviews, benefit versus cost matrices, and project management practices (Cross & Lynch, 1988). By utilizing these tools, ABC Company can start on the right footing, leading to a strategic alignment between defined goals and expected outcomes.
The key deliverables during this step would entail:
- A clear project charter detailing the project scope.
- A context diagram that visualizes interactions among processes, people, technology, and external factors involved.
- For new projects, the expected outputs would be a project charter, a scope description, a work breakdown structure, timeline, and resource estimates. For existing projects, this step would outline integration with current information quality (IQ) initiatives (Rodràguez-Elias et al., 2008).

Step 2: Analyze Information Environment


An in-depth analysis of the current information environment is essential. This involves gathering and systematically organizing information related to data, processes, individuals, and technology applicable to the defined business problem. Documenting the lifecycle of data that touches upon the business concern sets the groundwork for evaluating data quality moving forward (Rodràguez-Elias et al., 2008).
Consequently, the essential outcomes may include:
- A comprehensive data flow diagram illustrating the pathways through which information moves within the organization.
- A clear identification of key data metrics pertinent to business objectives.

Step 3: Assess Data Quality


Assessing data quality involves evaluating various aspects of data such as completeness, consistency, accuracy, and reliability. Identifying the extent and nature of data quality issues provides the basis for root cause analysis. ABC Company will utilize metrics to document potential impacts on business processes, thus establishing a need for action-driven improvement initiatives (Pipino, Lee, & Wang, 2002).
Outcomes from this step include:
- Documented data quality evaluation results and identified data accuracy issues.
- Preliminary communication efforts to ensure stakeholder awareness of the data quality assessment.

Step 4: Assess Business Impact


The next step entails gauging the effects of data quality issues on the business. Both qualitative and quantitative measures should be employed to establish a business case for IQ improvement. This analysis assists in garnering managerial support while strategically allocating resources toward data quality initiatives (Atyam, 2010).
Deliverables will include:
- A report summarizing potential repercussions of poor data quality.
- An investment strategy justifying required data corrections and enhancements.

Step 5: Identify Root Causes


This critical step seeks to uncover the root causes of IQ issues, ensuring that recommendations target true sources of problems rather than symptoms. Tools such as cause-and-effect diagrams or the 5 Whys technique can assist in identifying these underlying issues (Rooney & Heuvel, 2004).
Expected outcomes include:
- Structured recommendations aimed at addressing root causes.
- A detailed follow-up plan building from root cause findings.

Step 6: Develop Improvement Plans


With insights from prior analyses, ABC Company should create an action plan that prioritizes task implementations based on evaluation results. This strategic improvement plan must serve to address root causes, curtail future IQ issues, and rectify existing data inaccuracies (Caffyn, 1999).
Action plans should include:
- Identification of roles and individuals accountable for each action item.
- Communication strategies ensuring stakeholders are onboard with proposed changes.

Step 7: Prevent Future Data Errors


To sidestep future data issues, organizations should implement preventive measures that tackle root causes identified in step five. Development of improvement frameworks alongside adequately resourced remediation plans should be prioritized (Cheldelin & Ishii, 2004).
Outcomes from preventative strategies include:
- Effective solutions documented that mitigate future errors.
- Charts detailing the nature, visibility, and outcomes of implemented changes.

Step 8: Correct Current Data Errors


Attention must then shift to rectifying existing data errors that hinder business operations. A centralized system for documenting existing data issues with a streamlined resolution process is required for efficient remediation (Zhao & Olivera, 2006).
Expected outcomes include:
- Documented corrections alongside realized improvements.
- A refined communication plan addressing data correction efforts to stakeholders.

Step 9: Implement Controls


Ongoing monitoring and evaluation systems must be instituted to ensure sustained data quality improvements. This final control mechanism must focus on normalizing data processes along with periodic assessment and feedback mechanisms (Oppliger, Pernul, & Strauss, 2000).
Key deliverables would encompass:
- A framework detailing controls for ongoing data integrity assessments.
- A final communication to stakeholders summarizing processes and controls established.

Step 10: Communicate Actions and Results


Transparent communication throughout the project lifecycle holds significant value. ABC Company must actively share progress, learning outcomes, and impacts of enhancements made concerning data quality (Montgomery et al., 2013).
Regular touchpoints will include:
- Creation of educational materials highlighting the importance of data quality.
- Establishment of feedback loops that instill transparency and acceptance around outcomes from action plans.

References


1. Cross, K. F., & Lynch, R. L. (1988). The SMART way to define and sustain success. National productivity review, 8(1), 23-33.
2. Rodràguez-Elias, O. M., Martànez-Garcàa, A. I., Vizcaàno, A., Favela, J., & Piattini, M. (2008). A framework to analyze information systems as knowledge flow facilitators. Information and Software Technology, 50(6).
3. Pipino, L. L., Lee, Y. W., & Wang, R. Y. (2002). Data quality assessment. Communications of the ACM, 45(4).
4. Atyam, S. B. (2010). Effectiveness of security control risk assessments for enterprises. Information Security Journal: A Global Perspective, 19(6).
5. Rooney, J. J., & Heuvel, L. N. V. (2004). Root cause analysis for beginners. Quality progress, 37(7), 45-56.
6. Caffyn, S. (1999). Development of a continuous improvement self-assessment tool. International Journal of Operations & Production Management.
7. Cheldelin, B., & Ishii, K. (2004). Mixed-model assembly quality: an approach to prevent human errors. In ASME 2004 International Mechanical Engineering Congress and Exposition.
8. Zhao, B., & Olivera, F. (2006). Error reporting in organizations. Academy of Management Review, 31(4).
9. Oppliger, R., Pernul, G., & Strauss, C. (2000). Using attribute certificates to implement role-based authorization and access controls. In Sicherheit in Informationssystemen (SIS 2000).
10. Montgomery, S. V., et al. (2013). Preparing individuals to communicate genetic test results to their relatives: report of a randomized control trial. Familial cancer, 12(3).
This structured approach ensures that ABC Company effectively identifies, addresses, and mitigates data quality issues while also enhancing stakeholder communication and overall business performance. Each step provides comprehensive insight and actionable frameworks to foster sustainable improvements in data quality management.