Verified Document

Information Technologies What Is The Term Paper

The project sponsor is typically a senior executive who has the responsibility of accomplishing certain strategic objectives that are so wide in scope they require synchronization of many different parts of the organization. An example would be the development of an entirely new Customer Relationship Management (CRM) system that is capable of reporting back the contact and selling histories by each customer account. The project sponsor in this specific instance would typically be the Vice President of Sales, or the Vice President of Marketing. The project sponsor is also responsible for working with the broader organization to ensure the project has enough resources, both from a staffing standpoint in addition to support at the upper levels of management to ensure the project gets continued funding.

The role of the project champion is to be the leader of the actual development itself, often relying on a variety of consensus- and team-building approaches to accomplishing this. The best project champions are able to gain high levels of cooperation for their projects even from professionals not in their specific departments or who report to them directly. Further, the best project champions rely on a compelling vision of what the future project will deliver in terms of benefits, results, and even recognition for those who participate. In this way a strong project champion can transform teams, using a combination of emotional intelligence and transformational leadership. It is increasingly important for organizations to screen their project champions to see if they have transformational leadership ability.

Bass, B.M. (1998) predicts that demand for transformational leaders will increase markedly in this century and will be viewed as a response to a world that is increasingly complex, rapidly changing and highly globalized in its approach to accomplishing projects in an increasingly turbulent global environment.

What are the two approaches to estimating project costs and how are they different from one another

The two approaches to estimating project costs are the budget estimate, or as it is sometimes called, the top down approach and the second is the bottoms-up...

The budget estimate approach is created in the very early stages of a project and is often based on the amount of previous experience an organization or department has had in this area previously, and is often driven by the largest and most expensive expenditures first. This approach also takes into account existing internal budgets and the available resources to complete the task.
The definitive estimate or bottoms up estimating approach as it is sometimes called, is the more accurate of the two and requires in many cases a work breakdown analysis to define the key cost areas of the project. This work breakdown analysis or structure also serves to define the major milestones of the project as well. As a result, this approach is considered superior to the top-down planning practices of many organizations in that it captures in greater detail the needed action items and in larger projects, the dependencies associated with the project as well. Bottoms-up estimating also can serve to define which spending components are necessary and which are optional. This is invaluable in creating a project budget.

In summary, top-down approach is best used when there is already a very tight budget in place for managing a new project, as the available funds can act as a constraint on what is affordable to an organization. The bottoms-up approach on the other hand shows the steps necessary for completing the project, including a prioritization of each step and spend category if the planners make this an objective from the outset.

What challenge do file-sharing applications such as Napster cause organizations in trying to enforce policies and procedures?

There are actually many facets or sides to the challenge organizations have in trying to enforce policies and procedures as they relate to file-sharing applications including Napster and others. First, there is the security issue, specifically in the use of PEM (Memory Module) drives for moving music back and forth from work to home PCs and laptops, and to iPods and MP3 players. Organizations are concerned about these PEM drives also being used to move confidential data out of

Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technologies Describe the Three
Words: 1450 Length: 5 Document Type: Term Paper

Further, midrange systems can support a few thousands users, and often have operating systems more focused on distributing resources throughout a network vs. being a computing-intensive system. While there is increasingly a focus in midrange systems to provide both distributive support for networks and computing power, the predominant use of these systems is in synchronizing the many databases a small to mid-size organization up to a few thousand users

Information Technologies Since Time Immemorial, the Adage
Words: 658 Length: 2 Document Type: Essay

Information Technologies Since time immemorial, the adage "no man is an island" has always been true because of the social nature of humankind. Most human beings can never live and function without the support of others in various aspects of life. With the emergence of contemporary information and communications technologies, the "no man is an island" maxim has further been redefined because of the ubiquity and 24/7 interconnection of people

Communication and Information Technologies That Help E-Commerce
Words: 1043 Length: 3 Document Type: Essay

communication and information technologies that help e-commerce firms to perform work in a virtual work environment. The paper adopts the approach of a consultant tasked with performing SWOT analysis of Amazon. Based on the SWOT analysis of Amazon, the report recommends that the company should adopt DIVA, a group-ware communication and collaboration tool proposed by Sohlenkamp and Chwelos (1994). The model will help Amazon compete with the new e-commerce

IT Governance Information Technologies IT
Words: 890 Length: 2 Document Type: Book Review

This has saved many organizations literally millions of dollars by averting investments in IT programs that would have not delivered a sufficient enough return to make they valuable (Weill, Ross, 2004). IT Governance failures often manifest themselves through the lack of consistency on customer-facing strategies and a quick drop in customer satisfaction, along with ample evidence of a disconnected value chain throughout the business (Weill, Ross, 2004). The airline industry

Business Value How Information Technologies
Words: 1299 Length: 4 Document Type: Essay

As costs continued to escalate and IT was not creating any significant cost reductions through efficiencies, the focus shifted to outsourcing non-critical functions that were routine in nature and could be therefore replicated easily. In 1991, BP senior executives chose to begin outsourcing operations, telecommunications, systems development and IT maintenance. This strategy, along with the recentralization of IT led to the company eventually cutting their IT budget in half from

Information Systems for Healthcare Management of the
Words: 1512 Length: 5 Document Type: Essay

Information Systems for Healthcare Management Of the many enterprises that rely on information systems to attain their objectives, healthcare management is the most challenging and costly. The combination of highly complex application, systems and platform trade-offs, along with the need for continual government compliance makes information systems in healthcare one of the most difficult areas to attain best practices in of any IT area (Le Rouge, De Leo, 2010). The intent

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now