Write My Paper Button

WhatsApp Widget

PROJECT MANAGEMENT | My Assignment Tutor

1PROJECT MANAGEMENTBySharanjeet Singh2Table of ContentsIntroduction ………………………………………………………………………………………………………………..4Task.1 ………………………………………………………………………………………………………………………..4The detail description of the requirements of the client: …………………………………………………..4The three significant question that are needed to be asked to the steering committee for clarifyingthe requirements of them along with getting the additional information: …………………………….5Task 2: Work breakdown structure (WBS)……………………………………………………………………….5Phase 1: Project initiation …………………………………………………………………………………………..5Phase 2: Project planning……………………………………………………………………………………………6Phase 3: Project … Continue reading “PROJECT MANAGEMENT | My Assignment Tutor”

1PROJECT MANAGEMENTBySharanjeet Singh2Table of ContentsIntroduction ………………………………………………………………………………………………………………..4Task.1 ………………………………………………………………………………………………………………………..4The detail description of the requirements of the client: …………………………………………………..4The three significant question that are needed to be asked to the steering committee for clarifyingthe requirements of them along with getting the additional information: …………………………….5Task 2: Work breakdown structure (WBS)……………………………………………………………………….5Phase 1: Project initiation …………………………………………………………………………………………..5Phase 2: Project planning……………………………………………………………………………………………6Phase 3: Project execution ………………………………………………………………………………………….6Phase 4: Project monitoring………………………………………………………………………………………..6Phase 5: Project closure……………………………………………………………………………………………..7Gantt chart……………………………………………………………………………………………………………….8Task.3 ………………………………………………………………………………………………………………………..8The stakeholder analysis with listing three data collecting techniques which would be used forgetting information:………………………………………………………………………………………………………8Task-4………………………………………………………………………………………………………………………..9Prepare a Project Closure Report that identifies the project outcomes and lessons learned. ……9Project brief:…………………………………………………………………………………………………………9Objectives of the project:………………………………………………………………………………………..9Scope of the project:…………………………………………………………………………………………….10Stakeholders associated with the project:…………………………………………………………………10Budget:………………………………………………………………………………………………………………11Time frame:………………………………………………………………………………………………………..11Risks associated with the project: …………………………………………………………………………..11Project milestones……………………………………………………………………………………………………11Assumptions, dependencies, constraints, and risks………………………………………………………..12Email to the project manager ABC: ………………………………………………………………………..13Task.5 ………………………………………………………………………………………………………………………14List of 3 SNMP monitors which the company can utilize for displaying SNMP information: ….143Task.6 ………………………………………………………………………………………………………………………14The characteristics of an efficient technical team associated with a project: ………………………14Part.2 (Scheduling and managing)…………………………………………………………………………………15Task.2 ………………………………………………………………………………………………………………………15The communication strategy associated with the project:……………………………………………….15Task.3 ………………………………………………………………………………………………………………………17The risk management planning associated with the project: ……………………………………………17Part 3 – Question and Answer……………………………………………………………………………………….21Question 1 ……………………………………………………………………………………………………………..21Question 2 ……………………………………………………………………………………………………………..21Question 3 ……………………………………………………………………………………………………………..23Question 4 ……………………………………………………………………………………………………………..24Conclusion………………………………………………………………………………………………………………..26References ………………………………………………………………………………………………………………..274IntroductionProper project management ensures that the requirements of the client have been satisfiedsuccessfully. In this study, Western Winnings wants to establish a new branch office in Brisbane.The study discusses the requirements of the project and also develops a project plan and workbreakdown structure. The key questions regarding the requirements of the client have beenanswered properly in different tasks if the study.Task.1The detail description of the requirements of the client:• Firstly, the client wants the organisation to engage around five hundred and ten employeesfor continuing with the project. In addition to that, the server associated with themanagement department would not be accessed by the rest of the department on top ofwhilst the employees of this specific department would be provided with the fullaccessibility of the server along with the provision of internet access to make them accessboth the server and the hosts properly as per the demand of the client.• Furthermore, the E1 service conducted by Telstra can be utilised whereas the organisationneeds to search for more budget friendly options. Notwithstanding that, the specificationof the network utilised by the administrative department would be modernised router andswitches are needed to be utilised as per the criterion mentioned by the client (Chilenski etal.2016, p.19).• In addition to that, the information quote along with the power section are needed to betested by skilled electricians so that it would be ensured by the organisation that the bothinformation quote and power are appropriate for the requirement of network. Apart fromthat, the client is looking forward to receiving a proposal relating to network structure alongwith an entirely costed bill associated with the network structure and the raw materialsneeded to complete the project.• In addition to that, the client wants the administrative department to ensure a unique loginid for both the router as well as the switches on top of which they look forward to adynamically design IP address by the technical team associated with this specific project.The mentionable point here is that, the client has assigned every department with one single5server along with twenty personal computers besides connectors and cables and all thesesystems are configured using WAN connections in both of the terminals while OSPF getsto be used throughout the link. According to the client, the organisation ought to go forsurvey relating to wireless network and related configuration and set up to implement theproject successfully (Liu et al.2017, p.59).The three significant question that are needed to be asked to the steering committee forclarifying the requirements of them along with getting the additional information:1. According to the client, more budget friend options are needed to be searched but they alreadyhave mentioned to use the E1 service of Telstra. Is there any flexibility for the company to gofor more budget friendly option?2. The client needs the company to use budget friendly options. What is the approximatedconvenient budget for them?3. It is strictly mentioned that, irrespective of the management individuals no one have the accessto the hosts and the server. In case there would be any technical issue and since the managementteam would not be able to fix the same, what can be done?Task 2: Work breakdown structure (WBS)By preparing a WBS, it becomes easier to list all the tasks under the main activities within theproject. A proper WBS structure provides a clear idea of each task in a project and the deadlinefor it (Meredith et al. 2017, p.55). A proper WBS structure helps the project manager to developstrategies for completing all project-related tasks within pre-decided deadlines.Phase 1: Project initiationIn this phase, a project charter is developed. The objectives and key deliverables of the project aredefined in this phase. A list of required resources is prepared (Kerzner, 2017, p.66). The keystakeholders of the project are also identified in the initiation phase of the project. In the initiationphase, the major milestones of a project are also identified. Possible risks associated with theproject are also identified in this initiation phase. It is also necessary to fix all appoints with keystakeholders in this phase for discussing the project plan and getting it approved.6Phase 2: Project planningIn the second phase of project management, a proper plan for executing the project is developed.In this phase, the scope and duration of the project have been analysed. A Gantt chart has beendeveloped for analysing the time required for each task within the project. The members of theproject team have been selected and task delegations have been completed. A project budget hasalso been prepared for maintaining costs of project execution effectively (Heagney, 2016, p.66). Itis also necessary to develop a communication plan in this phase for managing communicationwithin the team members and other stakeholders in the project. Along with that, a cost managementplan and an HR management plan have been developed. Additionally, a quality management plan,procurement plan and risk management plan have been developed in the planning phase.Phase 3: Project executionIn the third phase of project management, the required resources are collected for projectexecution. The project plan used to get approved by the key stakeholders of Western Mining’s.The resources are allocated to members of the project team so that they can start the projectactivities. The quality standards are discussed with the team members so that they can managetheir performance accordingly (Schwalbe, 2015, p.88). In the execution phase, the communicationchannels have been established within the members of the project team as per the communicationplan developed in the planning phase. Additionally, in this phase, reports on project riskmanagement, procurement and forecasts are delivered to the project manager.Phase 4: Project monitoringIn the monitoring phase, the project manager monitors the progress of the project activities as perthe timeline. The success of the risk management procedures and budget adherence are alsoreviewed in this phase. In case, if these things are not appropriate, the project manager can alsomodify the procedures in this phase as per current requirements (Harrison and Lock, 2017, p.55).The work-related issues of the labours are analysed and solved in this phase so that the project canbe completed successfully within the deadline.7Figure 1: Work breakdown structure(Source: created by the researcher)Phase 5: Project closureIn the closing phase, the quality of the project is assured by the quality management officer. Theproject deliverables are tested properly and the quality assessor ensures that the project has beencompleted successfully and the requirements of the clients have been met effectively. A report onproject closure needs to be submitted in the project closure phase.• Development of project charterresource identificationfixing of appointments • Project • initiation• resource collectionprocurement plancommunication planrisk management planquality management planbudget preparation • • • • • Projectplanning• team member selectionresource allocationexecuting project activities • Project • execution• time managementquality testing Project • monitoring• documentationreport submission Project • closure8Gantt chartA Gantt chart is an effective tool for defining the deadlines of each task. By following this chartappropriately, the project activities can be completed successfully within time.Figure 2: Gantt chartSource: Created by the researcher)Task.3The stakeholder analysis with listing three data collecting techniques which would be usedfor getting information: Name of thestakeholderDesignationResponsibilityEstimatedimpactson theprojectPriorityJames T KirkManagerDecision-making relating tothe projectHigh1 9 Jack CrusherBranch officeManagerTechnical supportabilityHigh3Deana TroySenior systemengineerTasks and objectiveimplementation and detailsupdating and technicaloperationsHigh2Sharanjeet SinghProjectmanagerManagement of the projectHigh1 Table.1 Stakeholder Analysis(Source: Created by the writer)The three essential techniques of collecting information would be developing research questionsand answering the same, communicating with the stakeholders and direct observation (Demirkesenand Ozorhon 2017, p.1639).Task-4Prepare a Project Closure Report that identifies the project outcomes and lessons learned.Project brief:The organisation Western Mining is looking forward to initiating their new branch and thus isdesigning strategies to hire new employees in the departments of management, technology,operations and marketing. However, they are looking forward to employing skilled andexperienced people in every department on one hand whilst on the other hand; the organisation isall set to avail network designing in order to meet their project.Objectives of the project:• The objective of this project includes employing dedicative and experienced people in thedepartments of management, technology, marketing and operations.• Value addition to the infrastructure of the company in order to enhance their network allacross the global mining industry.10• Successful utilisation of information technology as well as information managementsystem along with network designing to increase the expansion of the organisation in thenew location they look forward to open their branch.• All the different aspects including management, budget planning, employmentrelationship, human resource management, infrastructure and technical aspects would becarried out only after re-checking the same by the experienced individuals (Eskerod andJepsen, 2016, p.109).Scope of the project:The scope associated with this project is the scope of business expansion of the organizationWestern Mining in Brisbane. In addition to that, the organization would get an opportunity ofadding value in their different departments including marketing, operation, management andtechnical department by employing experienced and dedicated staff. Therefore, human resourceteam held by this organization gets to be strengthening. Apart from that, the infrastructure andtechnical resources would be enriched since they are looking forward to upgrading their networkdesigning system besides searching for effective information technology solutions (Mark andLurie 2018, p.165).Stakeholders associated with the project: Name of thestakeholdersDesignationJames T KirkManagerJack CrusherBranch officerDeana TroySenior systemengineerSharanjeet SinghProjectmanager Table 2: The stakeholders associated with the project(Source: Created by the writer)11Budget:The expenses that would be recurred on monthly basis include the transportation expenses,expenses for supplying the raw materials and the salary of the staff. On the other hand, the onetime expenses comprise the total expense behind technical upgradation, insurance, expenses forhiring people in different departments and the legal expenses (Raum, 2018, p.170).Time frame:The total time frame associated with this project is of two months.• The date of project initiation is15th February, 2020• The date of completion of the project is16th April, 2020Risks associated with the project:The risks associated with this project include lack of fund, increasing expenses, legalcomplications, employee resistance, lack of skilled people, absence of proper management andoverdue of the project.Project milestonesProject milestones are those tasks that show the important achievements of the project. In thiscontext, there remain many subtasks under the main tasks of a project (Kerzner, 2017, p.77). Forexample, under project planning, there remain subtasks like resource collection, budgetpreparation and many others. Therefore, project planning can be considered as milestone.12Figure 3: Milestones achieved in this project(Source: Created by the researcher)Assumptions, dependencies, constraints, and risks AssumptionsIt has been considered that the project can be delivered within the limitedbudget and within the given timeframe.Some excessive requirements are needed by the workers in the laterstages of the project (Pratt, 2018, p.87).Network is going to be available to all the departments.DependenciesThe branch office is required to depend on the network provided byBrisbane operations management.The field survey is going to require the service of wireless network.The software known as SNMP is required to carry out the project.ConstraintsThe server provided by the management team of the project cannot beaccessed by other departments 13 The hosts need access to internet service along with the servers(Schaeffer et al. 2019, p.22)The members of the management team have to get the full access to thenetwork system of other departmentExpenses regarding the project cannot cross the budget limitationsRisksThe security department of the Western Mining company is not verytrustworthyThe electrical subcontractors associated with the project has to do thedata sampling (Coombs et al. 2019, p.45)The workers cannot give performance according to the job requirementsThe time required for the completion of the project may be longer thanexpectedThe safety of the workers can be a huge issue along with environmentalsafety Table 3: Assumptions, dependencies, constraints, and risks(Source: Created by the Researcher)Email to the project manager ABC:Dear ABC,I am writing this email to you to request you to go through the project charter relating to the projectof opening new branch of the organization Western Mining. I would like to inform you that, thecharter includes all the needful details like project brief, objective, budget planning, scope, timeframe and risk. However, I would be highly obliged if you go through the details and provide yourfeedback and suggestions regarding the same. The project charter is attached right below the email.I am looking forward to your valuable feedback.Thank youWarm Regards,14STUTask.5List of 3 SNMP monitors which the company can utilize for displaying SNMP information:The organization Western Mining can use modernized SNMP monitors such as ManageEngineOpManager for displaying the management details, SolarWinds Network Performance Monitor inorder to display the details relating to network designing efficiently and Pulseway IT Managementmonitor for the sake of displaying the information technology and management system relatingdata successfully (Sadgrove, 2016, p.198).Task.6The characteristics of an efficient technical team associated with a project:The characteristics of an efficient technical team associated with a project include proper directionof work so that they can put all their mutual effort towards the direction of their team objective. Inaddition to that, honest and open interaction between the team people would add value to theirinternal relationship besides engaging them working together collaboratively for the sameprospects. Moreover, high level of technical skills and skills relating to the upgraded technologieslike information technology, robotics, augmented reality, artificial intelligence, network designingand database management system and so on and so forth in all the team members would add totheir team efficiency. Unbiased and efficient leadership is equally essential to make value additionto a team (Varajão et al. 2017, p.216). Be that like it may, the mentionable point here is that, theleader must have degrees in technology and got significant years of experience so that they shouldprovide valid and viable solutions to the team members.In addition to that, technical department needs to come across several risks such as the risk ofrunning short of budget, risk of overdue due to lack of infrastructure and required technicalitiesand quick obsolete of the technologies etc. Therefore, the technical team needs to hold properprudence in order to overcome all these challenges and risks successfully and thus to reach theirdestination (Brown et al. 2016, p.77). To be more precise, risk acceptance and handling is signifiedas one of the potential characteristics of a successful technical team carrying out a project like the15one that has been handled by the technical team in the organisation Western Mining. Furthermore,technology has been upgrading at an advance pace and hence change is an inseparable aspect thatthe technical team needs to experience. In addition to that, the quality of time management,communicative capability, practicality and problem-solving outlook are considered as the greatqualities that the members of a technical team should incorporate in their character trait in orderto take their team towards success (KORYAGIN et al. 2016, p.163).Therefore, adaptation, high level of compatibility, change acceptance and management withoptimistic outlook and goal-oriented approach can add an extra momentum to the performance ofa technical team. In addition to that, innovative approaches, creative outlook, interest towardsinnovation and different ways of implementing the project and self-learning capability among theteam members can make the team more advances with enabling them meeting the goal withincorporating innovations in their tasks. Apart from that, sense of roles and duties, goal-orientation,mutual accountability, realistic approach, acceptance towards distinct opinion and self-initiationwould be the significant character traits that the individual members of the technical team oughtto have in order to enhance the overall performance of the team (Wiengarten et al. 2016, p.325).Part.2 (Scheduling and managing)Task.2The communication strategy associated with the project: NameResponsiblepersonIndividualresponsibilitiesInformation that isneeded to becommunicatedDeadlinesJames TKirkManagerDecision-making relatingto the project andconveying the same to theproject manager.Provision of approvalrelating to any particularchange, initiative ordecision, project relateddecisions, suggestionsand changes in strategiesOne week 16 and time frame and so onand so forth.SharanjeetSinghProjectmanagerTeam management,monitoring andcontrolling the projectalong withcommunicating with themanaging head and makechanges in projectplanning accordinglyRegular updates of theproject, short-time goalachievements, the needsand expectation of themembers of the team,needful changes in teammanagement, theperformance level of theteam members andneedful approvals orsuggestion the team lookforward to from themanaging head in order tocontinue flawlessly withthe project.In everythree daysJackCrusherBranchofficerTasks and objectiveimplementation anddetails updating andtechnical operations andcommunicating with theproject managerregarding the same.Technical information,needful updating in theexisting infrastructureand machinery and therequirements andexpectations of thetechnical team includingthe senior systemengineer and the networkengineer and the needfulapprovals or suggestionsfrom the project manager.Onregularbasis 17 DEANATRoySeniorsystemengineerUp-gradation of the statusof the project andtechnical operations andcommunicating with thebranch officer regardingthe same.Technical information,needful updating in theexisting infrastructureand machinery and therequirements andexpectations of thenetwork engineer and theother technicians andlabours and the needfulapprovals or suggestionsfrom the branch manager.OnregularbasisDeannaTroyNetworkengineerTechnical supportabilityand communicating withthe senior systemengineer on regular basisto take and provideupdates.Needful technicalsupportability,information relating tothe injuries or accidentsof the labours in theproject site, labourdissatisfaction and strikeand consistency of workbesides the needfulapprovals andsuggestions from thesenior system engineer.Onregularbasis Table.2 Effective communication process associated with the project(Source: Influenced by Badewi, 2016, p.761 and Brown et al. 2016, p.93)Task.3The risk management planning associated with the project:Risk management is nothing but assessing all the small and large risks while designing a strategicproject management planning (Woods et al. 2017, p.325). However, the risks associated with the18project of opening new branch by the organisation Western Mining include the risks of labourresistance, shortage of fund, health and safety risks and risks of breaching of laws and so on.However, all these risks would be analysed with drafting strategies to mitigate the risk factors inthe following table: Risks associatedwith the projectImpactsof the riskon theprojectPriorityof theriskStrategic risk management planningShortage of needfulfundHigh1Proper budget management planning shouldbe drafted in the presence of managing head,project manager, branch officer and seniorsystem engineer and the strategic projectmanagement planning along with the projectcharter should be followed while designingthe budget planning for the project.Additionally, the budget planning mustinclude other expenses so that it would beutilised in need.Lack of skills amongthe staff associatedwith projectHigh2The human relationship management planningrelating to this project should be designedeffectually with keeping an eye on theessential skills that would be needed tocomplete project. In addition to that,information such as the minimum number ofyears of experience, significant skills, otherskills and expertise would be mentioned in therecruitment criterions. Moreover, the skillsand experience of the applicants would beassessed thoroughly during the interviewsession to mitigate the risk of skill lack. 19 Labour resistanceHigh2The project might involve a number ofchanges in policies and protocols resulting inincreasing labour resistance. Be that like itmay, in order to keep the labour motivated andsatisfied, it is essential providing them withproper guidance and training along withproviding their deserving rewards and bonus.Additionally, the network engineer needs tocommunicate with the labours on regular basisin order to understand their dissatisfaction andrequirements besides the challenges and skillgaps they have been suffering from and toconvey the same to the higher hierarchy.Risks of injuries oraccidents in theproject siteHigh1Health and safety are one of the potentialaspects of any project and hence would not becompromised under any circumstance.However, the environment of the project siteshould be safe and healthy for the labours ontop of which an emergency care departmentwould be kept ready in the project site so thatin case there will be any accident or injury,this medical team would be there to take careof the same.Risk of overdue ofthe projectHigh2The deadlines would be met strictly withmaking all the staff associated with thisproject the significance of time frame for thisundertaking. In addition to that, teammembers with overdue tasks would be warnedand then should be penalised for theirirresponsible outlook towards their duties. 20 Legal complicationsHigh3The project manager should go for discussionswith legal consultants with seeking theiradvice in order to design a legally transparentproject management strategy. In addition tothat, all the significant legislations andstandards of the project of developing newbranch ought to be followed thoroughly by theorganisation Western Mining to get rid of allthe legal complications associated with thisproject. Table.4 Risk assessment and management(Source: Influenced by Andersen and Sax, 2019, p.32 and Aven, 2016, p.11)21Part 3 – Question and AnswerQuestion 1References: Interviewing TechniquesDuring the initial stages of the project you will interview a range of stakeholders to gatherinformation about project requirements, risks, and assumptions. Name 2 types of questionsthat you should include in interviews?Two kinds of questions have been asked to the stakeholders in the interview process. These areprobe questions and opening questions (Bertino and Ferrari, 2018, p.425). In the probe questions,the stakeholders have been asked about their personal opinions. In opening questions, thestakeholders have been given options like yes or no to the particular questions.Question 2What are the privacy requirements?General requirementsWestern mining organization has given importance to maintain the privacy of the stakeholders.The organization has collected the necessary information from respondents under the AustralianPrivacy Law and 1988 data protection act (Fernandez and Alexander, 2016, p.35) All these actshave been considered to collect the personal information of the organization. All other respondentshave been stated all the principles before collecting their data.Requirements for data collectionThe organization is going to collect necessary information from the individuals and overallorganization after following instructions from APP Chapter 3 (Jain et al. 2016, p.25). All theauthorizations have been informed about activities and functions related to the projectmanagement. The organization can collect the necessary data from other parties as well. In additionto that, the organization can collect the data from available public sources as well. All the22respondents have been informed about this and required consents have been taken from them aswell.What is required to do with the collected information?In the organization, after collecting the data, all of them are going to be stored in the form of cloudstorage system. The organization can use the cloud software known as drop box business for thispurpose (Alsmadi and Abu-Shanab, 2016, p.244). The necessary information can be revealed tocertain people within a certain period. The organization may verify the identity of the respondentsto get validity of the provided information. The organization needs to keep the requests of theprovision services. Interrelationship between the organizational management team andrespondents has been given importance. The collected information has been secured for futurereferences such as security checking. The police or higher authority can check those details later.Confidential data revealingUnder the Australian Privacy Law, the organization cannot share confidential data to any thirdparties. There are also some situations in which the organization can reveal that information (Alaviet al. 2017, p.100). Personal data can be shared with the contractors after taking necessary steps.They can be given certain clauses not to share the information without seeking permissions. Thepurposes behind choosing and using the data need to be shared with the respondents before furtherprocessing. The confidential data can be used for the cases like police checking and creditchecking. Sometimes, the information can be shared with certain authorities such as suppliers,carriers, contractors, and service providers.Information securityAll those information can be restored by the organization after securing the privacy. Feelings,securing, and safeguarding are regarded as high importance while collecting the data.Importance of company websiteThe chosen organization currently uses HTTPS platform in order to secure the certain amount ofdata (wesminllc.com, 2020). The website provided by the organization consists of many things23such as cookies, URL, headers before the process of signing in. limited information about theproject need to be provided by the organization.Way of contacting with the organizationThe queries regarding the policies, legislations, regulations about data privacy can be solved thelegal department. Any confusion, query can be solved the legal experts of Western Mining officesituated in Brisbane.Question 3Copyright3.1 Name Australian legislation that deals with the following areas of intellectual propertyand copyright:Some key legislations of Australia deal with the concerns of copyright and intellectual property.The legislations are as follows;● The Designs Act 2003: According to this act copying individual designs withoutpermission is a punishable offence in Australia (Legislation.gov.au, 2020).● Patents Act 1990: This act preserves the ownership of an individual patent(Legislation.gov.au, 2020).● The Trademarks Act 1995: This act preserves the uniqueness of an intellectual propertylike network system of Western Mining in the periphery of Australia.● Circuit Layout Act 1989: The management of Western Mining has decided to set up astakeholder accession network in Brisbane branch of the company. The layout of SNMPmonitoring network is secured under the provisions of this act (Legislation.gov.au, 2020).● Copyright Act 1968: Any completed or undergoing project of Western Mining and thedesign of the whole project framework is preserved under the provisions of this act(Legislation.gov.au, 2020).3.2 A colleague has found an interesting article in an industry journal and suggests that itshould be scanned and emailed to all staff. What would you advise your colleague?The copy of the article by Noonan (2016, p.27), covers copyright provisions of an individualproject work. As per the article copyright preserves the authenticity of the original work. This toolis helpful for safe transfer, implementation of a project work like SNMP monitoring project of24Western Mining. This article covers some instances where the provisions of copyright have notbeen strictly imposed. This aspect can be considered as ordinary copyright history. This articlealso covers a handful of incidents where the provisions of copyright have been strongly imposed.According to Dawson and Yang (2016, p.283), there are some major works where the intellectualrights have to be preserved accordingly.3.3 You discover that one of the clients for which Western Mining provides hosting servicesoperates a website that encourages members of the public to upload commercially availablemusic and videos which can then be downloaded by anyone else. Is Western mining in breachof copyright legislation? Why or why not? You may write your answer below or submit aword-processed document.The management of Western mining has decided to abide by the provisions of The Copyright Actof 1968. They are not in verge of breaching the copyright legislations. From the onset of MNSPproject, Western mining has not signed any obligation regarding the protection of the intellectualrights of third parties. According to the code of Western mining, they are not responsible forspecific actions of their customers (Wesminllc.com, 2020).3.4 Write a copyright policy for Western Mining that describes how Western Mining viewsand deals with these issues.The Copyright Policy of the company can be set based on the provisions of the Copyright Act1968 (Legislation.gov.au, 2020). This law grants the right of the creator to protect the exclusiverights of distribution and usage of an original product. Western mining is the sole producer of theirproducts. The copyright policy of the company covers all the instances regarding the use ofproducts by employees, contractors and the direct stakeholders of the company. The managementof Western mining believes in maintaining all the responsibilities related to copyright centrally(Wesminllc.com, 2020). Therefore, it can be said that company take responsibility of all activitiesof direct stakeholders. However, the activities of the customers are not the obligation of thecompany.Question 4Write a code of conduct for Western Mining that will inform anyone working for WesternMining of the standard of behaviour expected.A brief overview of the code of conduct of the company is as follows:251. IntroductionThe collection of regulations and rules of a company related to acceptable behaviours areconsidered as code of conduct. The management tries to maintain equality throughout theworkplace eradicating all possible causes of discrimination. The management of the companydesires to enhance the public reputation of the company by maintaining code of conduct.2. Codes2.1 Regulation for professional and personal behaviourThe main objective of the code of conduct of the company has been finalised based on theprovisions of ethical code of conduct for workplaces in Australia (Worksafe.qld.gov.au, 2020).The key objectives of code of conduct of Western mining are as follows;● Securing the assets of the company● Abide by all the relevant laws applicable to the company● Eradicating all causes of discrimination from the workplace● Focusing on the concerns of the customers effectively● Respecting the dignity of the employees and encouraging empowerment of the employees(Wesminllc.com, 2020)2.2 Channelization of informationThe management, employees and all other direct stakeholders of Western mining have to abide bythe provisions of the Copyright Act of 1968 (Oaic.gov.au, 2020). The regulations are as follows;● Maintaining the confidentiality of the information● Limited accession to the confidential information related to a project● Restricting the use of confidential information for other purposes● Without legal order no channelization of confidential information (Wesminllc.com, 2020)2.3 Maintaining equality in the workplaceAccording the provisions of Equal Opportunity Act of 1984, the management of Western mininghas to provide equal opportunities to all employees irrespective of their national origin, religiousbelief, gender specification and marital status (Leipiziger, 2017, p.57).2.4 Occupational safetyIn order to abide by the provisions of Work Health and Safety Act of 2011, the management ofWestern mining needs to ensure that the internal activities of the company cause no harm to theemployees and also focuses on preventing pollution by adoption of waste management practices.262.5 Confidentiality of informationWithout the self published data of the company, no other data can be used for any other purpose.No employee is expected to disclose any confidential information outside the company premises.2.6 Non acceptance of gifts from outsideAs mentioned above the code of conduct of the company prevents its employees and directorsfrom accepting any gift from outside entities. By this measure, the company has tried to limit theinfluential forces of outside (Wesminllc.com, 2020).2.7 ConflictsIn order to mitigate the conflict of interests, the company has restricted any personal relationshipof the employees with the customers (Wesminllc.com, 2020).3. Failure to maintain code of conductThe company has written instructions regarding the breach of code of conduct by any employeewhich entails that the company can take disciplinary action against any employee who is subjectedto breach the code of conduct of Western Mining. This can be a show cause notice, financialpenalty, and suspension or can cause termination from employment. Therefore, the employees areexpected to follow the code of conduct of the company (Wesminllc.com, 2020).ConclusionFrom all the discussions about the privacy policies provided by the organization, it can beconcluded that the respondents are one of the most important stakeholders regarding the successfulcompletion of a business project. The project management task has been broken down as per thework breakdown structure (WBS) provided by the project manager. The project has been classifiedinto certain categories from initiation to completion. All the risk factors have been noted down andrisk matrix has been provided by the project manager as well. After getting necessary approvalfrom the assessors, the report for project closure has been provided as well. Necessary softwarelike SNMP has been used by the project management team.27ReferencesAlavi, A., Quach, A., Zhang, H., Marsh, B., Haq, F.U., Qian, Z., Lu, L. and Gupta, R., 2017,March. Where is the weakest link? a study on security discrepancies between android apps andtheir website counterparts. In International Conference on Passive and Active NetworkMeasurement (pp. 100-112). Berlin: Springer, Cham.Alsmadi, I. and Abu-Shanab, E., 2016. E-government website security concerns and citizens’adoption. Electronic Government, an International Journal, 12(3), pp.243-255.Andersen, T.J. and Sax, J., 2019. Strategic Risk Management: A Research Overview. Abingdon:Routledge.Aven, T., 2016. Risk assessment and risk management: Review of recent advances on theirfoundation. European Journal of Operational Research, 253(1), pp.1-13.Bertino, E. and Ferrari, E., 2018. Big data security and privacy. In A Comprehensive GuideThrough the Italian Database Research Over the Last 25 Years (pp. 425-439). Berlin: Springer,Cham.Badewi, A., 2016. The impact of project management (PM) and benefits management (BM)practices on project success: Towards developing a project benefits governanceframework. International Journal of Project Management, 34(4), pp.761-778.Brown, G., Strickland-Munro, J., Kobryn, H. and Moore, S.A., 2016. Stakeholder analysis formarine conservation planning using public participation GIS. Applied Geography, 67, pp.77-93.Carstens, D.S., Richardson, G. and Smith, R.B., 2016. Project management tools and techniques:A practical guide. London: CRC Press.Coombs, S., Hudson, M., Holland, L., Schaeffer, N.C. and Dykema, J., 2019. General InterviewingTechniques: Developing Evidence-Based Practices.Chilenski, S.M., Perkins, D.F., Olson, J., Hoffman, L., Feinberg, M.E., Greenberg, M., Welsh, J.,Crowley, D.M. and Spoth, R., 2016. The power of a collaborative relationship between technicalassistance providers and community prevention teams: A correlational and longitudinalstudy. Evaluation and program planning, 54, pp.19-29.Demirkesen, S. and Ozorhon, B., 2017. Impact of integration management on construction projectmanagement performance. International Journal of Project Management, 35(8), pp.1639-1654.Dawson, P.H. and Yang, S.Q., 2016. Institutional repositories, open access and copyright: whatare the practices and implications?. Science & Technology Libraries, 35(4), pp.279-294.28Eskerod, P. and Jepsen, A.L., 2016. Project stakeholder management. Abingdon: Routledge.Eoc.sa.gov.au (2020). Equal Opportunity Act 1984. Available at:https://eoc.sa.gov.au/resources/discrimination-laws/south-australian-laws/equal-opportunity-act[Accessed on: 10th January 2020]Fernandez, A. and Alexander, K.M., 2016. Data Privacy and Confidentiality. iURBAN: IntelligentUrban Energy Tool, p.35.Globerson, S., Vardi, S. and Cohen, I., 2016. Identifying the Criteria Used for Establishing WorkPackage Size for Project WBS. The Journal of Modern Project Management, 4(1).Harrison, F. and Lock, D., 2017. Advanced project management: a structured approach.Abingdon: Routledge.Heagney, J., 2016. Fundamentals of project management. Cambridge: Amacom.Jain, P., Gyanchandani, M. and Khare, N., 2016. Big data privacy: a technological perspective andreview. Journal of Big Data, 3(1), p.25.Kerzner, H., 2017. Project management: a systems approach to planning, scheduling, andcontrolling. Hoboken: John Wiley & Sons.KORYAGIN, V., BLAVT, O. and GREBINCA, G., 2016. Optimization of the technical trainingsystem. Journal of Physical Education and Sport, 16(2), p.163.Liu, P., Zhou, Y., Zhou, D.K. and Xue, L., 2017. Energy Performance Contract models for thediffusion of green-manufacturing technologies in China: A stakeholder analysis from SMEs’perspective. Energy Policy, 106, pp.59-67.Legislation.gov.au (2020). Circuit Layouts Act 1989. Available at:https://www.legislation.gov.au/Details/C2012C00729 [Accessed on: 10th January 2020]Legislation.gov.au (2020). Copyright Act 1968. Available at:https://www.legislation.gov.au/Details/C2017C00180 [Accessed on: 11th January 2020]Legislation.gov.au (2020). The Designs Act 2003. Available at:https://www.legislation.gov.au/Details/C2017C00044 [Accessed on: 15th January 2020]Legislation.gov.au (2020). Work health and safety Act 2011. Available at:https://www.legislation.gov.au/Details/C2018C00293 [Accessed on: 11th January 2020]Legislations.gov.au (2020). Patents Act 1990. Available at:https://www.legislation.gov.au/Details/C2019C00088 [Accessed on: 12th January 2020]29Legislations.gov.au (2020). Trade Marks Act 1995. Available at:https://www.legislation.gov.au/Details/C2017C00046 [Accessed on: 14th January 2020]Leipziger, D., 2017. The corporate responsibility code book. Abingdon: Routledge.Lock, D., 2017. Naked Project Management: the bare facts. Abingdon: Routledge.Lock, D., 2017. The essentials of project management. Abingdon: Routledge.Mark, S. and Lurie, Y., 2018. Customized project charter for computational scientific softwareproducts. Journal of Computational Methods in Sciences and Engineering, 18(1), pp.165-176.Meredith, J.R., Mantel Jr, S.J. and Shafer, S.M., 2017. Project management: a managerialapproach. Hoboken: John Wiley & Sons.Noonan, P., 2016, June. Copyright infringement as theft. In Intellectual Property Forum: journalof the Intellectual and Industrial Property Society of Australia and New Zealand (No. 105, p. 26).Intellectual and Industrial Property Society of Australia and New Zealand Inc.Oaic.gov.au (2020). Privacy Act 1988. Available at: https://www.oaic.gov.au/privacy/the-privacyact/Pratt, M., 2018. Project Closure Document. No.09, p. 28Schaeffer, N.C., Dykema, J., Coombs, S.M., Schultz, R.K., Holland, L. and Hudson, M., 2019.General Interviewer Techniques: Developing Evidence-Based Practices for StandardizedInterviewing.Raum, S., 2018. A framework for integrating systematic stakeholder analysis in ecosystemservices research: Stakeholder mapping for forest ecosystem services in the UK. Ecosystemservices, 29, pp.170-184.Sadgrove, K., 2016. The complete guide to business risk management. Abingdon: Routledge.Schwalbe, K., 2015. Information technology project management. London: Cengage Learning.Tonchia, S., Tonchia and Mahagaonkar, 2018. Industrial project management. Berlin: Springer.wesminllc.com (2020). Home Available at: https://www.wesminllc.com/ [Accessed on: 3rdJanuary, 2020]Varajão, J., Colomo-Palacios, R. and Silva, H., 2017. ISO 21500: 2012 and PMBoK 5 processesin information systems project management. Computer Standards & Interfaces, 50, pp.216-222.Wiengarten, F., Humphreys, P., Gimenez, C. and McIvor, R., 2016. Risk, risk managementpractices, and the success of supply chain integration. International Journal of ProductionEconomics, 171, pp.361-370.30Woods, C.T., Veale, J.P., Collier, N. and Robertson, S., 2017. The use of player physical andtechnical skill match activity profiles to predict position in the Australian Football Leaguedraft. Journal of sports sciences, 35(4), pp.325-330.Worksafe.qld.gov.au (2020). Code of Conduct. Available at:https://www.worksafe.qld.gov.au/about-us/workcover-queensland/corporate-governance/codeof-conduct [Accessed on: 12th January 2020]Zohrehvandi, S., Khalilzadeh, M., Hajizadeh, M. and Cheraghi, E., 2017. Planning project closurephase in combined cycle power plant projects. Procedia computer science, 121, pp.274-281.

Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?