TAILIEUCHUNG - Lecture Information technology project management (Sixth Edition): Chapter 3 - Kathy Schwalbe

Chapter 3 - The project management process groups: A case study. This chapter describes each project management process group in detail through a simulated case study based on JWD Consulting. It also includes samples of typical project documents applied to this case. | Information Technology Project Management, Sixth Edition Note: See the text itself for full citations. Describe the five project management (PM) process groups, the typical level of activity for each, and the interactions among them Understand how the PM process groups relate to the PM knowledge areas Discuss how organizations develop information technology PM methodologies to meet their needs Information Technology Project Management, Sixth Edition Review a case study of an organization applying the project management process groups to manage an information technology project; describe outputs of each process group; and understand the contribution that effective project initiating, planning, executing, monitoring and controlling, and closing make to project success Information Technology Project Management, Sixth Edition A process is a series of actions directed toward a particular result Project management can be viewed as a number of interlinked processes The project management process groups include: Initiating processes Planning processes Executing processes Monitoring and controlling processes Closing processes Information Technology Project Management, Sixth Edition Information Technology Project Management, Sixth Edition Philip A. Pell, PMP, commented on how the . IRS needed to improve its project management process. “Pure and simple, good, methodology-centric, predictable, and repeatable project management is the SINGLE greatest factor in the success (or in this case failure) of any project The project manager is ultimately responsible for the success or failure of the project.”* In 2006, the IRS lost more than $320 million due to a botched fraud-detection system project A 2008 . Government Accountability Office (GAO) report stated that IRS had fixed just 29 of 98 information security weaknesses identified the previous year *Comments posted on CIO Magazine Web site on article “For the IRS, There’s No EZ Fix,” (April 1, 2004). .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.