Verified Document

Information Technologies What Is The Term Paper

The project sponsor is typically a senior executive who has the responsibility of accomplishing certain strategic objectives that are so wide in scope they require synchronization of many different parts of the organization. An example would be the development of an entirely new Customer Relationship Management (CRM) system that is capable of reporting back the contact and selling histories by each customer account. The project sponsor in this specific instance would typically be the Vice President of Sales, or the Vice President of Marketing. The project sponsor is also responsible for working with the broader organization to ensure the project has enough resources, both from a staffing standpoint in addition to support at the upper levels of management to ensure the project gets continued funding.

The role of the project champion is to be the leader of the actual development itself, often relying on a variety of consensus- and team-building approaches to accomplishing this. The best project champions are able to gain high levels of cooperation for their projects even from professionals not in their specific departments or who report to them directly. Further, the best project champions rely on a compelling vision of what the future project will deliver in terms of benefits, results, and even recognition for those who participate. In this way a strong project champion can transform teams, using a combination of emotional intelligence and transformational leadership. It is increasingly important for organizations to screen their project champions to see if they have transformational leadership ability.

Bass, B.M. (1998) predicts that demand for transformational leaders will increase markedly in this century and will be viewed as a response to a world that is increasingly complex, rapidly changing and highly globalized in its approach to accomplishing projects in an increasingly turbulent global environment.

What are the two approaches to estimating project costs and how are they different from one another

The two approaches to estimating project costs are the budget estimate, or as it is sometimes called, the top down approach and the second is the bottoms-up...

The budget estimate approach is created in the very early stages of a project and is often based on the amount of previous experience an organization or department has had in this area previously, and is often driven by the largest and most expensive expenditures first. This approach also takes into account existing internal budgets and the available resources to complete the task.
The definitive estimate or bottoms up estimating approach as it is sometimes called, is the more accurate of the two and requires in many cases a work breakdown analysis to define the key cost areas of the project. This work breakdown analysis or structure also serves to define the major milestones of the project as well. As a result, this approach is considered superior to the top-down planning practices of many organizations in that it captures in greater detail the needed action items and in larger projects, the dependencies associated with the project as well. Bottoms-up estimating also can serve to define which spending components are necessary and which are optional. This is invaluable in creating a project budget.

In summary, top-down approach is best used when there is already a very tight budget in place for managing a new project, as the available funds can act as a constraint on what is affordable to an organization. The bottoms-up approach on the other hand shows the steps necessary for completing the project, including a prioritization of each step and spend category if the planners make this an objective from the outset.

What challenge do file-sharing applications such as Napster cause organizations in trying to enforce policies and procedures?

There are actually many facets or sides to the challenge organizations have in trying to enforce policies and procedures as they relate to file-sharing applications including Napster and others. First, there is the security issue, specifically in the use of PEM (Memory Module) drives for moving music back and forth from work to home PCs and laptops, and to iPods and MP3 players. Organizations are concerned about these PEM drives also being used to move confidential data out of

Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology Change Management in Home Health
Words: 1391 Length: 5 Document Type: Essay

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Information Technology a Home Network
Words: 1182 Length: 4 Document Type: Essay

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology Acts What Were the Advances
Words: 660 Length: 2 Document Type: Essay

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

Information Technology IT Is a Broad-Based Term
Words: 1674 Length: 4 Document Type: Essay

Information Technology (IT) is a broad-based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new, appearing in a 1958 article in the Harvard Business Review in which the authors said, "this new technology does not yet have a single established name. We shall call it information technology (IT)" (Dunn,

Information Technology and Its Uses
Words: 5994 Length: 22 Document Type: Thesis

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

Information Technology Is a Constantly
Words: 653 Length: 2 Document Type: Essay

In the nursing field, there is becoming a concept such as the digital divide among nurses. Even though many nurses are familiar with the Internet and access it on a daily basis, there are some nurses who are familiar with other emerging technologies as it pertains to nursing and there are some nurses who feel that navigating the Internet is the only technology they need to know (Lupianez-Villanueva et

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now