This objective also include the need to develop a solid it security infrastructure by building strategies, recruiting qualified staff, implementing the latest technologies and best practices as identified in the research.
The study was guided by the following specific objectives:
1. Achieve cost effectiveness once the portfolio management software is applied to the needs of the Abu Dhabi Government;
2. Identify how much the solution will save in terms of time, money, and efforts if it is applied;
3. Determine how the initiative will affect the utilization of existing resources;
4. Identify optimum approaches for ensuring the project is updated regularly and monitored with regards to its budget; and,
5. The risks the will inevitably be faced.
Importance of Study
Information security has become one of the most important and challenging issues facing today's organizations. With pervasive use of technology and widespread connectedness to the global environment, organizations increasingly have become exposed to numerous and varied threats (Rotvold, 2008). Information security is the process and techniques of protecting information, data, system infrastructures, networks, and so forth. It protects its availability, privacy and integrity from any unwanted habits from any malicious actions by accessing to stored information on computer databases has increased greatly. A lot of companies and industries store business information and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. That means data are more valued than the money. All the businesses are fully dependent on information especially Military, Governments (E-Government), Banks, etc. Most of the information nowadays is now gathered, analyzed, processed and stored on database computers. That information exchanged and transmitted across networks through LAN (Local Area Network) and WAN (Wide Area Network) to other computers.
Scope of Study
The core principles of Information Security are: Confidentiality, Integrity and Availability. Confidentiality, Integrity, Availability, Authenticity, Risk management is the main concept of securing any it infrastructure (portfolio for Abu Dhabi government). Also we should include Incident response plans
Rationale of Study
According to Essex (2005), a wide range of increasingly sophisticated project management tools have been introduced in recent years and these project management tools and their corresponding analytical methodologies have transformed the manner in which large projects are managed today. In almost every way, information technology has influenced project management or has the ability to do so if approached in thoughtful ways. The field of collaborative software solutions has identified a number of different approaches that can be used for these purposes, with a secure intranet representing one of the more common and cost-effective alternatives that are available. In this environment, the need security in these collaborative communications networks directly relates to the criticality and sensitivity of the information that is introduced on the network. Therefore, it is important to ensure that the collaborative project management environment remains secure from the start and throughout its administration.
Overview of Study
This paper used a six-chapter format; chapter one introduced the topic under consideration, a statement of the problem, the purpose and importance of the study, as well as its scope and rationale. Chapter two provides a critical review of the relevant and peer-reviewed literature, and chapter three presents the study's methodology, a description of the study approach, the data-gathering method and the database of study consulted. Chapter four presents the research results, including failure and safety analyses. Chapter 5 provides a discussion of the research and chapter 6 presents the study's conclusion and recommendations for directions in future study.
Chapter 2: Review of Related Literature
Project Portfolio Management
One of the most significant contributions to the field of project management in recent years has been Project Portfolio Management. In many projects, the costs that are involved makes the need for effective project management essential. For example, according to Wideman (2006), "Because project management has moved from the domain of capital infrastructure projects to any type of endeavor that qualifies as a 'project.' Then, with the advent of business automation systems through the use of computers and the concomitant software development, the opportunity for innovative value-added projects has burgeoned to...
Notwithstanding the challenges involved, the stakes are high and there is little room for false starts or experimentation; therefore, identifying a general set of best practices that Gambian organizations can follow in developing their own set of sustainable productivity practices represents a valuable and timely undertaking, which relates to the purpose of the study which is discussed further below. Purpose of Study The overall purpose of this study was to study
In their study, "Thinking of Inclusion for All Special Needs Students: Better Think Again," Rasch and his colleagues (1994) report that, "The political argument in favor of inclusion is based on the assumption that the civil rights of students, as outlined in the 1954 decision handed down in Brown v. Board of Education, which struck down the concept of 'separate but equal,' can also be construed as applying to special
126). Although there are an increasing number of elderly in the United States today with many more expected in the future, the study of elder abuse is of fairly recent origin. During the last three decades of the 20th century, following the "discovery" of child abuse and domestic violence, scholars and professionals started taking an active interest in the subject of elder abuse. This increased attention from the academic
In the event of such an epidemic, it is reasonable to assume that public health departments will be pressed to find ways to maintain their services even when employees are ill, normal supply chains are disrupted, and the nation's infrastructure is inoperative; furthermore, the traditional roles of environmental health professionals can also be expected to change in dramatic ways during a period of pandemic influenza (Fabian, 2006). As U.S. Secretary
However, the sum total of the organization's output extends beyond the realm of the quantifiable. Qualitative measures also exist, and they can impact on the quality of the organization's output as well. It can be argued that even qualitative outputs will eventually impact on quantitative outputs. Ford's loss of reputation as the result of the Pinto scandal, for example, cannot be quantified but the sales and profit decreases that
During this penultimate period of violence under Rojas, the violence that wracked Colombia assumed a number of different characteristics that included an economic quality as well as a political one with numerous assassinations taking place. These were literally contract killings there were sponsored by opposition forms. There were also horrendous genocidal acts that were carried out by gangs combined with authentic revolutionary fighting in some regions of the country. The fourth
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now