Apply Project Information Management and Communications Techniques - Question 1

Summarise models and methods of communications management in context of project life cycle and other project management functions (approx. 150 words).

Answer:

Project management functions are required to be collaborative where connection between all the responsible persons is highly appreciated and required. The communication model involves three parts such as sender, receiver and the message. The management of communication includes the process of developing, gathering, distributing, accumulating, retrieving and the ultimate nature of project information. This is performed in the first stage of project life cycle where initial project information is required to be distributed among the related persons. It is required to decide the audience or target audience whom the message is intended to such as sponsors, team members, customers and so on (Ferreira et al. 2017).

An objective of the message to be shared is required to be developed so that during the phase of execution team members and other stakeholders remain aware of the project status. At the time of closing the project effective communication helps in revisiting the overall project performance to ensure all members are aware of the project outcome. Communication method might include interactive communication where meetings and conference calls help in increasing communication between the members. Push communication is used when the sender of the message does not what response or feedback from the receiver.

Apply Project Information Management and Communications Techniques - Question 2

Explain importance of information security in managing risks in project management. (approx. 70 words)

Answer:

Project owner is required to clearly define the information security throughout the project lifecycle. It plays an important role in protecting the access of project information from any unauthorized ID which helps in keeping the project information confidential (Turskis et al., 2019). Issues or potential breaches of information, risks such as copyright issues can be addressed. The triad of information security such as confidentiality, integrity and availability is required to be considered and for the security purpose, Anti-Virus, Firewall, BYOD can be used or adding new members into the project.

Apply Project Information Management and Communications Techniques - Question 3

Outline methods of reviewing outcomes in project management. (approx. 100 words)

Answer:
The methods of reviewing project outcomes includes gap analysis. Here, it is required to understand how the intitial project objectives and outcomes differ from each other and which area is not addressed properly. A thorough examination is conducted in order to understnd if the project goals are achieved. It is also required to assess the level of satisfaction of the stakeholders and sponsors as it is an important indicator of the project success. As mentioned by Ewinet al., (2017), a cost benefit analysis is required to be conduced to understand, if the investment made has successfully covered all the required area and benefitted the project. If there is discripancy, planning for further development is required to be created. However, sufficient recommendation for the future project management is provided.

Apply Project Information Management and Communications Techniques - Question 4

When conducting meetings regarding specific projects, identify what legal and ethical requirements participants must adhere to and explain why? (approx. 50 words)

Answer:

Legal requirements in a fair project management meeting is providing a proper notice prior to the meeting date with an assurance that the participants for whom the project is intended are aware of the objectives, importance and requirements of the meeting. It is due to the legal responsibility of the project manager to interact about every decision made about the project. After conducting the meeting a Minute is required to be prepared to summarize the meeting identifying the main objectives, targets set and method suggested for progressing with the project. In some specific project managers are required to consider the voting rights if applicable for decision making (Dickert et al., 2017).

Project participants are required to hold themselves as accountable for any successful or failed decision made in the meeting which is an ethical requirement. It is due to the ethical responsibility of the project meeting participants for showing respect and regard to the decision made by the participants (Bodó et al., 2017). While conducting a meeting every participant are required to provide with the opportunity to place their concerns.

Reference List for Apply Project Information Management and Communications Techniques

Bodó, B., Helberger, N., Irion, K., Zuiderveen Borgesius, F., Moller, J., van de Velde, B., ... & de Vreese, C. (2017). Tackling the algorithmic control crisis-the technical, legal, and ethical challenges of research into algorithmic agents. Yale JL & Tech., 19, 133.

Dickert, N. W., Eyal, N., Goldkind, S. F., Grady, C., Joffe, S., Lo, B., ... & Wendler, D. (2017). Reframing consent for clinical research: a function-based approach. The American Journal of Bioethics, 17(12), 3-11.

Ewin, N., Luck, J., Chugh, R., & Jarvis, J. (2017). Rethinking project management education: a humanistic approach based on design thinking. Procedia Computer Science, 121, 503-510.

Ferreira, F., Faria, J., Azevedo, A., & Marques, A. L. (2017). Product lifecycle management in knowledge intensive collaborative environments: An application to automotive industry. International Journal of Information Management, 37(1), 1474-1487.

Turskis, Z., Goranin, N., Nurusheva, A., & Boranbayev, S. (2019). Information security risk assessment in critical infrastructure: a hybrid MCDM approach. Informatica, 30(1), 187-211.

Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Management Assignment Help

Get It Done! Today

Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
Not Specific >5000
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore MASS
Order Now

Request Callback

My Assignment Services- Whatsapp Tap to ChatGet instant assignment help

Hire Certified Experts
Ask your Question
Need Assistance on your
existing assignment order?

We care

MyAssignmentServices uses cookies to deliver the best experience possible.
My Assignment Services acknowledges the academic integrity guidelines prescribed as per Australian Universities to ensure that the services, sample material, and study resources available on our website, in no way are utilised to commit academic misconduct of any type. All users of our services must adhere to and affirm acceptance of all conditions elucidated in our policy document on academic integrity.

Please accept and affirm the following to be able to continue exploring our website and services: I agree to NOT use any educational material, study resources, assignment samples, online mentoring services, available on the web domain www.myassignmentservices.com and all its subdomains to commit any academic misconduct. I have read and been made fully aware of the academic integrity policy of My Assignment Services and by clicking on the button below, I am in principle, wilfully and legally bound to adhere to guidelines of the academic integrity policy in whole and in part.
View Cookies policy | How we ensure Academic Integrity?