StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Security System of the University of East London - Case Study Example

Cite this document
Summary
The purpose of this paper "The Security System of the University of East London" is to discuss post-project implementation evaluation of the security system of the University of East London. This system is developed by our group, now we will present a post evaluation of this project. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
The Security System of the University of East London
Read Text Preview

Extract of sample "The Security System of the University of East London"

The Security System of the University of East London Table of Contents Introduction 1 Description of the project 1 Risk Analysis Tools 6 Group Decision- Making Techniques 8 Evaluation of decision making process 8 Results/findings 9 Conclusion 10 Recommendations 10 Acknowledgement 11 Executive Summary The purpose of this report is to discuss post project implementation evaluation of the security system of the University of East London. This system is developed by our group, now we will present a post evaluation of this project where we keen to discuss the main achievements and some project implementation scenarios. Introduction In this report I will present the evaluation of project that we have already completed named as "The security system of the University of East London”. In this report I will evaluate this project regarding its development point of view. I will evaluate the project management tools which we have used in the development of this project. Then I will also discuss the main project decision making, and their impacts. In this report I have provided the brief introduction to the project management techniques which we have used during our project. Description of the project In this section I will discuss a little about my project and the things those have been implemented. We have purposed a security system of the University of East London. This system has designed to secure the University of East London campus by means of advance security system. For this we have purposed to implement and install 100 more advanced technology CC cameras that would increase the area of coverage and provide help in reducing the frequency of incidents by 10%. We have also purposed to increase the number of patrols around the campus by 5 times than the daily normal routine. This system also demands to increase the number of lighting around the required areas where the CC cameras are installed for better visibility. By the implementation of this system we would have a batter security system which has the capability to protect the university assets or to prevent and detect external intrusion. Evaluation of tools In this section I will discuss and evaluate the main tools which we have used for the development of our security system. Gantt chart We have made use of MS Project to create our project’s Gantt chart. This project management tool has facilitated us in a number of ways. We are able to get more enhanced representation of the activities and deliverable during the project development. With the help of this tool it is very easy to determine the order of activities which have facilitated to accomplish these entire tasks on time and according to the specified procedure. We have better and clear representation of all activities by which we can plan and start the subsequent activity. The allocation of resources has also provided a great advantage regarding the project execution point of view. So the utilization of this tool has a great impact on the overall project planning and effectively management of this project. Organizational Breakdown Structure (OBS) We have utilized the Organizational Breakdown Structure in our project. This technique has facilitated us in numerous ways, like we are able to effectively discharging of duties and responsibilities. With the implementation of this technique we have achieved a better and clear job distribution among group members and it has provided us a comprehensive way for the overall project execution and task management. This tool has provided us the opportunity to divide the whole project in sub tasks view, where each task has its responsible executer. So we have analyzed that this tool has facilitated us very much for the overall project management. Product Flow Diagram (PFD) By utilizing this technique in our project we have achieved a better project execution path way. Here in this tool we have a whole project execution cycle. Product flow diagram makes easy to analyze the overall progress level of the whole project and its associated activities. So this is a good way for the whole project development tracking. Responsibility Matrix Responsibility Matrix is an excellent technique for the project task specification, and execution. In the development of our security system we have also utilized this tool for the effective project management. The incorporation of this tool has facilitated us to define the roles and responsibilities of each project group member in the early stages of the project execution. So after performing this activity each group member has been able to carry out his responsibility section. This tool has also highlighted the people or departments who carried out specific activities or group of activities for the completion of this whole task. So the incorporation of this project management tool was a success for our project handling. Stage plan We have implemented this project management technique to effectively handle each stage which is presented in our project. Stage plan has outlined the each stage duration, work structure, resources and number of members which have accomplished it. Here in our project we have four main stages given below: (As in project report p-4) Requirements of Equipment Implementation of the Plan Verification of the installation Maintenance of the system These four stages also comprise more sub stages inside them; there is need for the better resource allocation and time line management, so the stage plan has facilitated us in a very effective way to stream line the whole project resources and group workers. So as concluding this technique we can say it has a deep impact of the careful and on time delivery of our project. Network Diagram This technique has provided us a visual representation of the project schedule and stages execution. Here this project monitoring technique has provided us the facility to have a better understanding of the connection among activities in the project in relation to the overall time scale of the entire project. This technique has guided us for the each phase and its associated phases. With the help of this technique we have a clear view of the whole project development critical path. Network Table As similar to network diagram, network table has given us the view of each project’s subtask execution sequence and its relation to other activities. This technique has also facilitated us for the better project handling. Waterfall technique for project development We have used waterfall model for the development of our security system. This technique is best in case of less group members and long time constraint (as we were having months). So we have chosen this technique for the batter management of our project in limited resources. This technique has provided us a sequential way for the development of the whole project. We have accomplished our task by living in short resources only by means of this project execution technique. This technique also helped us to minimise the risk of not meeting the time schedule. Product breakdown structure (PBS) We did not use work break down structure instead we have decided to utilize the Product breakdown structure (PBS) that is similar to the work breakdown structure. These both outline the each individual process in the order of which those must be completed. This helped us to stream line the whole project’s deliverables (products) and their attainment for the fulfilment of the overall project. So by this we were having a better view of whole project’s execution and management in terms of its subtask view. Precedence Table We have incorporated this tool to streamline the whole project execution sequence and project management cycle. Here we have assigned each task a specific priority number. A task with a high priority number has the probability to execute earlier. So we have a whole project exaction structure by implementation of this technique. Quality log Quality log is way to manage the project by assigning each task a quality assured method of execution and the responsible person for its management. So by this we are able to ensure that project is executing in an excellent way with required quality. Risk Analysis Tools Risk Log: We also have tried to manage and tackle the whole project risk in a better way for this purpose we have developed the Risk log of our project. We have listed the potential risks which can affect our project execution. In this log we have listed the risk its probability of occurrence and the impact of this risk on the overall progress. So by managing these details we are able to get better risk handling and risk mitigation plan for the overall project. Risk Contingency plans: In the Risk Contingency plans we have outlined the severity of the risk, its impact and mainly its contingency plan for the better risk management. This tool has provided us a way for the better risk identification and mitigation. Group Decision- Making Techniques We have used the consensus style of the decision making for our project and group deceasing. This style of decision making has been chosen from the 3 types of group decision-making techniques those are based on the Vroom- Yetton leadership model. Consensus Style We have tried to incorporate the whole group view point in the process of the decision-making. By implementing this style the whole team was having a surety that any change or action was taken by after taking their view point. In this project all group member have the same level of the decision making which has facilitated to the leader to work through the decision process until all members agree to the decisions been made. This method of decision making has provided us an advantage of the increased commitment to the decision that has been made. Evaluation of decision making process During the development of this project we have planned the overall project in such a way that we will hold a group meeting after one week. We have used this day of week for the monitoring, evaluating, synchronizing, and further planning of the project. In this meeting all members were present to share their experience, findings and issues. Here we have taken decisions according to sated decision strategy. During the decision making process all members were allowed to present their opinions and also they were free to present their negative views against any previous decision or action. So we have implemented a healthy environment for the overall project decision making process. Here we have tried to present the more common solution to each issue so that no conflict has risen. The group is a good mix of personalities and capabilities they have better understanding of each other, in this way we never got any conflicting situation on any matter. So the overall deceasing process was friendly but comprehensive. Results/findings In this section I will discuss the main outcomes of the project. As we are glad to state that this project is completed in allocated time and other constraints. This project’s biggest advantage is the knowledge and experience which we have gained during its development. This experience will help us throughout the life. Here we have implemented a number of project management techniques and tools; these are the real need of the current project management skills. As we talk about the security enhancement by its implementation, then we see that there is a lot of scope for its implementation. University of east London can enhance the whole campus security by implementing this security enhancement project. Here we have tried our best to manage and deploy the more state of art technology and tried to minimize the overall risk regarding the security. So the project completion was a success and we have accomplished our stated goals and objectives. Conclusion We have tried to implement a system which is capable to enhance the overall security of the University of east London campus. Here we have tried to manage all resources in a better way to develop a system which is better and effective to implement. The completion of this project is a success for our group. In this project we have learned many things, lots of these things that we have done were encountered first time in our lives. We have learned to manage the system and its resources. This experience is very helpful for us throughout our lives. This system is designed in a way which enhances the security requirements of the overall security system of the university. Our purposed system has capability to effectively manage the whole security environment and detect any outer intrusion. So we hope that the university will obtain effective outcomes after the implementation of our purposed system. Recommendations We have to incorporate the new project management tools for the different event handling. Like we have to use some risk assessment tools for the better risk assessment and mitigation for the future projects. Acknowledgement First of all we want to thank the GOD that helps us to complete this task. Then we want say thank to our teacher Mr._____ who’s valuable and effective assistance helped us a lot to complete this project. He helped us always in each difficulty by giving his precious time. We want to mention the name of our friends Mr.___ who also helped us to reach at this stage. We shall always thankful to these all for helping to accomplish this difficult project. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Security System of the University of East London Case Study, n.d.)
The Security System of the University of East London Case Study. Retrieved from https://studentshare.org/management/1719396-evalutaion-report-of-the-security-system-of-the-university-of-east-london
(The Security System of the University of East London Case Study)
The Security System of the University of East London Case Study. https://studentshare.org/management/1719396-evalutaion-report-of-the-security-system-of-the-university-of-east-london.
“The Security System of the University of East London Case Study”, n.d. https://studentshare.org/management/1719396-evalutaion-report-of-the-security-system-of-the-university-of-east-london.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Security System of the University of East London

Global Food System

Emerging acknowledgement of other food problems has placed the concerns of the food system in a much broader context.... There are environmental challenges facing the global food system.... Each of these challenges does not cross modern borders, hence making the study of the food system itself a valuable and important experience (McMicheal, 1994, p20).... The primary concern of the Food security involves a situation whereby all human beings have physical and economic access to enough, safe and nutritious food that can meet their dietary needs and food preference for an active and healthy life....
6 Pages (1500 words) Research Paper

Compensation System

london: Green Lion Publishers.... New York: Princeton university Press.... California: California university Press.... The compensation Compensation system Compensation system Introduction Compensation in the work place includes forms of insurance which provides wage placement and medical benefits to injured employees.... When individual suffers as a result of negligence he/she does not get compensation from any system (Jones, 2012)....
2 Pages (500 words) Essay

How Disintermediation Helps Decrease the Transaction Risk of Purchasing Items by Consumers

Global business environment is becoming highly competitive as several leading organisations across the globe are trying to implement unique strategies in business operation process in order to gain potential competitive advantages over their respective competitors.... hellip; Disintermediation occurs due to high inflation rate....
8 Pages (2000 words) Essay

Business Plan - Marketing Section

london: Kogan Page.... The company sent a group of marketing staff to school districts in the local areas and the greater parts of the North east United States, to carry out some research, which realized several findings.... AKVEV stands to be in business because of a number of factors, and would be able to provide services to the North east United States since it has two offices located in Philadelphia, PA and NEW York, NY.... Melbourne: university Press....
1 Pages (250 words) Research Paper

Case Study of a Biomatric surveillance technology on primary school children

On safety, for example, the biometric system can notify automatically parents of their children's safe arrival at school.... In addition, a… Most biometric systems in use in schools today use fingerprint scanners, in which case students scan themselves twice every day as they pass through sensors....
5 Pages (1250 words) Essay

Money-Air: Instant Money

This paper "Money-Air: Instant Money" discusses Money-Air Inc.... which strives to produce a product that has its basis on information technology.... This company is a business that premises itself on technology-based solutions like mobile application development and problem-solving products and services....
4 Pages (1000 words) Case Study

Management Information Systems

The aim of the paper "Management Information Systems" is to analyze the implementation of the web-based e-commerce system.... This system will offer better user support and facility of the online dealing.... hellip; The system should have a simple interface that can be easily accessed.... This system will be an independent structure regarding online management and administration of the web-based transaction.... In this report, I will present a detailed analysis of the client-server system implementation and development....
7 Pages (1750 words) Research Paper

IT's Role in Banking

The paper "IT's Role in Banking" discusses the bank's close connection with technologies.... nbsp;Information technology is a source that is very enabling and crucial in business.... Banks today have been adopting the latest technologies, in order to survive and maintain growth in the market.... hellip; Information systems were introduced in order to enhance efficiency in the activities and processes of businesses and therefore assist in attaining profits and other cost benefits....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us