Page 1 of 6 School of Property, Construction and Project Management — BUSM4619 Information and Technology Management Assessment 2: Management report II Assessment Type: individual report Word limit:...

1 answer below »
Please find the attached file


Page 1 of 6 School of Property, Construction and Project Management — BUSM4619 Information and Technology Management Assessment 2: Management report II Assessment Type: individual report Word limit: 2,500 words (+/– 10%) Due date: Sunday of Week 5 11:59PM (AEST) Weighting: 30% Overview You’re employed as the Coffee Construction Australia’s (CCA) Senior Project Director/Manager, and you have recently completed your Master of Project Management at RMIT. You have completed the investigation into the information systems from Assessment 1 when Jim Coffee (the firm’s Chief Construction Executive, and a member of the senior leadership team) says that following the excitement generated at Board level by your previous management report, he wants you to prepare another management report for the senior leadership team’s next meeting. Some members of the senior leadership team have expressed interest in understanding more detail about particular information systems. Learning Outcomes − Analyse, synthesise and apply complex project management theory to address industry issues, and implement new directions in project management − Professionally communicate your ideas and strategy, justifying decision making to diverse project management and organisational stakeholders − Employ your knowledge of project management theory and recent industry developments to identify problems and formulate solutions that respond to the diverse needs of project stakeholders − Apply appropriate research methods, tools and technical skills to plan, implement and evaluate projects that contribute to the profession and the field of knowledge in the discipline. After completion of this assessment you should be able to: − Evaluate and determine the alignment between the business functions and an information system’s features and functionality. − Provide supporting evidence and information to garner support for the selected IS. − Understand how an information system can be leveraged by a project manager. Page 2 of 6 Assessment details Details Please refer to the brief in Appendix A of this document for further details on the company. Select an information systems category from the table below and write a management report explaining: − The information system’s features and functions in detail, and how they align to the firm’s business functional areas/operations. − How the information system will assist the firm to improve their business operations. − How the information system can assist project managers in managing projects and if not why not. Remember the audience is the senior (executive) leadership team who are NOT technology literate, so you should use appropriate business language and refrain from using project management, construction, or technical jargon. Note: Select one of the following information system categories: − Supply chain management − Project portfolio management − Knowledge management − Enterprise mobile management − Business intelligence system − Extranet and intranet References The assignment should contain no less than 10 references. These sources should be based around a mix of academic publications such as books, texts and peer-reviewed conference proceedings, journal papers, and industry journals not just internet references and must be correctly referenced in-text as a mix of direct quotations and paraphrases and also listed at the end of your document in a reference list. Page 3 of 6 Academic integrity and plagiarism Academic integrity is about honest presentation of your academic work. It means acknowledging the work of others while developing your own insights, knowledge and ideas. You should take extreme care that you have: − Acknowledged words, data, diagrams, models, frameworks and/or ideas of others you have quoted (i.e. directly copied), summarised, paraphrased, discussed or mentioned in your assessment through the appropriate referencing methods, − Provided a reference list of the publication details so your reader can locate the source if necessary. This includes material taken from Internet sites. If you do not acknowledge the sources of your material, you may be accused of plagiarism because you have passed off the work and ideas of another person without appropriate referencing, as if they were your own. RMIT University treats plagiarism as a very serious offence constituting misconduct. Plagiarism covers a variety of inappropriate behaviours, including: − Failure to properly document a source − Copyright material from the internet or databases − Collusion between students For further information on our policies and procedures, please refer to the University website. Assessment declaration When you submit work electronically, you agree to the assessment declaration. Referencing guidelines You must acknowledge all the courses of information you have used in your assessments. Refer to the RMIT Easy Cite referencing tool to see examples and tips on how to reference in the appropriated style. You can also refer to the library referencing page for more tools such as EndNote, referencing tutorials and referencing guides for printing. Submission format Upload as one single file via the assignments submission page within Canvas. Use RMIT Harvard referencing style for this assessment. https://www.rmit.edu.au/students/student-essentials/rights-and-responsibilities/academic-integrity https://www.rmit.edu.au/students/student-essentials/assessment-and-exams/assessment/assessment-declaration http://www.lib.rmit.edu.au/easy-cite/ http://www1.rmit.edu.au/library/referencing http://www1.rmit.edu.au/library/referencing Page 4 of 6 Working as a group Many courses require you to work in a group to complete various assessments. It is the collective responsibility of all group members to actively contribute and complete any project. If any individual is unavailable during this time, the group will need to adjust responsibilities to allow for the work to be completed. It is recommended that students elect a group leader to take responsibility for this. Working in a group requires consistent interaction and communication. This should be done within Canvas, Google Hangouts, email etc. Should any individual be unavailable for an extended period of time, it is the responsibility of the group members, or group leader, to advise their tutor to discuss the situation. This should be raised as early as possible if students wish to apply for an extension or special consideration. For further information about understanding group work, visit RMIT Learning Lab. Assessment Criteria Criteria Ratings Pts Fulfilment of overall assignment intent All parts done very well. Demonstrates exceptional comprehension of topic. Some parts done excellently. Shows thorough knowledge and understanding of the topic, with evidence of reading beyond the key texts. All parts dealt with satisfactorily. Shows evidence of relevant and sound knowledge and understanding of the topic and reading of key texts. Broadly completed but some parts are superficially treated misunderstood or overlooked. Shows relevant knowledge of the topic. Failure to adequately address the tasks. Shows inadequate knowledge of the topic to meet learning outcomes. 70.0 pts 55.0 pts 48.0 pts 41.0 pts 28.0 pts 70.0 https://emedia.rmit.edu.au/learninglab/content/understanding-group-work Page 5 of 6 Structure and organisation, including citations Structure and sequence effectively used to help integrate ideas and support logical argument. Fully supported by reference to relevant up to date material. Accurate use of Harvard referencing technique. Logically sequenced and connections between different themes or sections are well made. Clear evidence of wide and relevant reading. Accurate use of Harvard referencing technique. Sequence and structure are logical and easy to follow. Introductory and concluding sections used effectively. Well informed by reading which goes beyond key texts. Accurate use of Harvard referencing technique. Structured well enough to make sense. Instances of irrelevance or confusion. Effective use of key reading. Accurate use of Harvard referencing technique. Poor structure, illogically organised; irrelevance and confusion. Poor use of reading. Poor or incorrect use of Harvard technique. 15.0 pts 11.0 pts 10.0 pts 8.0 pts 6.0 pts 15.0 Grammar and spelling Powerful, confident and precise use of language; mastery of style and tone. Language demonstrates precision and expressiveness as well as clarity. Displays an excellent use of standard of written English. Language is generally sound and clear throughout, business- like and little use of jargon. Spelling, punctuation, & grammar very good. Clear enough to be understood; some confused or unclear expression. Spelling, punctuation, & grammar satisfactory but likely to need attention. Unclear, confused expression. Poor standard of written English. 15.0 pts 11.0 pts 10.0 pts 8.0 pts 6.0 pts 15.0 Total: 100 pts Page 6 of 6 Appendix A Course Brief Coffee Constructions Australia (CCA) The following course brief is to be used as the baseline company for assignments 1 & 2 Background: Coffee Constructions is a privately owned (family) Australian building and civil engineering business, it commenced operations in Melbourne in 1973 initially working from an office located above an antiques shop. Coffee Constructions holds fully certified builder’s licenses in NSW, QLD, NT and ACT. Coffee Constructions early projects included boutique hotels, large residences, primary schools, a range of facilities for local councils, work for the CSIRO, and a waste water treatment plant. During the 1980s Coffee Constructions was awarded the contract to complete a regional Arts Centre. The centre contained a 490-seat theatre and a 220-seat performing arts space. The business experienced consistent growth during the 1980's with the awarding of several high-profile contracts that enabled Coffee Constructions Australia to consolidate its position in established fields and branch into new sectors of the industry. The 1990's saw Coffee Constructions Australia continue to grow. Client relationships developed during the previous two decades were further strengthened with several major projects being carried out at a tier one university. The 1990's also saw the business expand its operations
Answered Same DayJun 13, 2021BUSM4619

Answer To: Page 1 of 6 School of Property, Construction and Project Management — BUSM4619 Information and...

Soumi answered on Jun 15 2021
139 Votes
INFORMATION SYSTEM USAGE: ENTERPRISE MOBILE MANAGEMENT
Table of Contents
Introduction    3
Detailed Description of Enterprise Mobile Management    3
Alignment of Enterprise Mobile Management with Coffee Construction Australia Operations    5
Enterprise Mobile Management in Improving Coffee Construction Australia’s Performance    6
Rationale for the Impact of Enterprise Mobile Management on Project Managers    7
Conclusion    8
References    9
Introduction
The construction business is one of the most profitable and consistently expanding industries in the world and in context of Australia; it
is equally relevant, being a major contributor in the GDP of the country. In order to get immune from the increasing competition and increasing demands for high value for money projects in construction business, the need of proper data collection, their storage and processing, leading to accurate strategy formulation and profit potential churning , has led to the increasing use of Information Technology and subsequently the use of Information System (IS). In the given report, the impact of using Enterprise Mobile Management (EMM) on project managers and their management skill have been described and in the context of the chosen organisation, namely Coffee Construction Australia (CCA) has been evaluated, giving an in depth view of information system and its relation with business management.
Detailed Description of Enterprise Mobile Management
Taking note of the benefits of Information and Communication Technology (ICT), its increasing usage in the form of smart mobile devices such as laptops, smartphones, Internet of Things and many more, as well as the benefits of Bring Your Own Devices (BYOD) at workplace has collectively developed Enterprise Mobile Management (EMM). As mentioned by Masuda et al. (2018), in EMM, mobile devices, their users and a fixed system network is used for business purpose-data collection, storage, processing and distribution. The EMM is different from Local Area Networks (LAN), used in business organisations. It is so as in case of LAN, the connection is established by wired transmission lines and the reach is limited to a single organisational facility. On the other hand, in case of EMM, wireless connections are used and the reach of the system remains employee centric, helping business organisations that have temporary or permanent decentralised organisational positioning. As stated by Allen (2019), EMM is capable of securing data used by employees from al potential vulnerabilities and offers high productivity due to its capacity of higher communication and remote accessibility.
EMM has its functions based on four major components – mobile device management, smart application management, mobile content management and users’ authentication management. As explained by Brouillette and Barday (2018), in case of mobile device management (MDM), business organisations focus on the security of the devices that are being granted access to the organisational database. In the initial stage of MDM, the devices used by employees of a chosen organisation, using which an employee wishes to use of organisational data, are enrolled into the system, so that the device owner and the used device can be traced at convenience. Based on the enrolment of the mobile devices in the system, as described by Patel et al. (2018), the project managers secure the data using wireless connectivity, which makes the data less vulnerable and secured.
With the help of MDM, the existing data from any enrolled employee devices can be erased for security purposes. Secondly, as opined by Simpson and Foltz (2018), there is smart application management (SAM), with the help of which business organisational managements control the connectivity and accessibility system provisions of the applications used on mobile devices of their registered employees. They also use software regulations to control access to the system by controlling the applications unlike, MDM, where the devices are controlled by the management for business data security purposes. As assessed by Al-Ani, Alheeti and Jawad (2018), in case organisational employees changing their devices across different mobile platforms, or use different devices at the same time (such as a laptop, smartphone and tablet), smart application management proves to be beneficial.
Thirdly, there is the mobile content management, which makes the management department of business organisation control the nature of the information, made available to the employees, registered under the system. As comprehended by Veljkovic and Budree (2019), the mobile content management (MCM) includes the aspect of data encryption-decryption formats, criteria for system access, the nature of the data, the scope for their offline download, the confidential data viewing authority and device configuration. MCM acts commercially, and it gives access to users, registered in the system, unlike cloud data servers, who give access to any person with the device in which the password is saved. In case of MCM enabled systems, the producing of passwords are required every time a person wants to log into the system and use the available data and information for any business purposes.
Lastly, there is user authentication management (UAM), which ensures that only the user only accesses the system, giving lesser importance to MDM, SAM, MCM, as UAM uses the users biometrics, usage patterns and random password generation process to authenticate the user. As mentioned by Krey (2018), one of the major benefits of using UAM is that even if an employee changes the hardware, the process of registration will not be required and the server of the system would provide the saved data and available data links to the used device only for the time the person is logged into the system.
Alignment of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here