Presentation is loading. Please wait.

Presentation is loading. Please wait.

Project Scope Management Information Technology Project Management, Fifth Edition Note: some slides have been removed from the author’s original presentation.

Similar presentations


Presentation on theme: "Project Scope Management Information Technology Project Management, Fifth Edition Note: some slides have been removed from the author’s original presentation."— Presentation transcript:

1 Project Scope Management Information Technology Project Management, Fifth Edition Note: some slides have been removed from the author’s original presentation. Some slides are added to address security projects

2 What is Project Scope Management? Scope refers to all the work involved in creating the products of the project and the processes used to create them A deliverable is a product produced as part of a project, such as hardware or software, planning documents, or meeting minutes Project scope management includes the processes involved in defining and controlling what is or is not included in a project Information Technology Project Management, Fifth Edition, Copyright 2007 2

3 Project Scope Management Processes 1. Scope planning: deciding how the scope will be defined, verified, and controlled 2. Scope definition: reviewing the project charter and preliminary scope statement and adding more information as requirements are developed and change requests are approved 3. Creating the WBS: subdividing the major project deliverables into smaller, more manageable components 4. Scope verification: formalizing acceptance of the project scope 5. Scope control: controlling changes to project scope Information Technology Project Management, Fifth Edition, Copyright 2007 3

4 Figure 5-1: Project Scope Management Summary Information Technology Project Management, Fifth Edition, Copyright 2007 4

5 1.Scope Planning and the Scope Management Plan The scope management plan is a document that includes descriptions of how the team will prepare the project scope statement, create the WBS, verify completion of the project deliverables, and control requests for changes to the project scope Key inputs include the project charter, preliminary scope statement, and project management plan Information Technology Project Management, Fifth Edition, Copyright 2007 5

6 2. Scope Definition and the Project Scope Statement The preliminary scope statement, project charter, organizational process assets, and approved change requests provide a basis for creating the project scope statement As time progresses, the scope of a project should become more clear and specific Information Technology Project Management, Fifth Edition, Copyright 2007 6

7 Scope definition The scope may be described in many different ways, dependently on the project nature For example: The list of functions to be delivered Outline of technology environment to be covered Category of devices to be included Particular technology solutions to be incorporated Information Technology Project Management, Fifth Edition, Copyright 2007 7

8 3. Creating the Work Breakdown Structure (WBS) A WBS is a deliverable-oriented grouping of the work involved in a project that defines the total scope of the project WBS is a foundation document that provides the basis for planning and managing project schedules, costs, resources, and changes Decomposition is subdividing project deliverables into smaller pieces A work package is a task at the lowest level of the WBS Information Technology Project Management, Fifth Edition, Copyright 2007 8

9 Approaches to Developing WBSs Using guidelines: some organizations provide guidelines for preparing WBSs The analogy approach: review WBSs of similar projects and tailor to your project The top-down approach: start with the largest items of the project and break them down The bottom-up approach: start with the specific tasks and roll them up Mind-mapping approach: mind mapping is a technique that uses branches radiating out from a core idea to structure thoughts and ideas Information Technology Project Management, Fifth Edition, Copyright 2007 9

10 Figure 5-6: Sample Mind-Mapping Approach for Creating a WBS Information Technology Project Management, Fifth Edition, Copyright 2007 10

11 What Went Wrong? A project scope that is too broad and grandiose can cause severe problems Scope creep and an overemphasis on technology for technology’s sake resulted in the bankruptcy of a large pharmaceutical firm, Texas-based FoxMeyer Drug p. 201 In 2001, McDonald’s fast-food chain initiated a project to create an intranet that would connect its headquarters with all of its restaurants to provide detailed operational information in real time; after spending $170 million on consultants and initial implementation planning, McDonald’s realized that the project was too much to handle and terminated it. p.202 Northrop Grumman insurance, 1980’s, system dubbed “Naziware”; not in touch with how end users did their work. p202 Information Technology Project Management, Fifth Edition, Copyright 2007 11

12 4. Scope Verification It is very difficult to create a good scope statement and WBS for a project It is even more difficult to verify project scope and minimize scope changes Scope verification involves formal acceptance of the completed project scope by the stakeholders Acceptance is often achieved by a customer inspection and then sign-off on key deliverables Information Technology Project Management, Fifth Edition, Copyright 2007 12

13 5. Scope Control Scope control involves controlling changes to the project scope Goals of scope control are to: Influence the factors that cause scope changes Assure changes are processed according to procedures developed as part of integrated change control Manage changes when they occur Variance is the difference between planned and actual performance Information Technology Project Management, Fifth Edition, Copyright 2007 13 Scope Creep

14 Best Practices for Avoiding Scope Problems 1. Keep the scope realistic … 2. Involve users in project scope management … 3. Use off-the-shelf hardware and software whenever possible … 4. Follow good project management processes: … Information Technology Project Management, Fifth Edition, Copyright 2007 14

15 Define Security Project Scope Make sure that your scope covers most vulnerable assets Perform vulnerability analysis to identify key areas for your project Evaluate outstanding assets and perform risks analysis Use the company-wide methodology of security risks management Write so called Residual Risks Statement Outline security risks that remain after the project implementation Send the statement to the manager Information Technology Project Management, Fifth Edition, Copyright 2007 15

16 Create Security Project WBS The same approach as for any other project Use applicable tasks, e.g installation, hardening, configuration Practical things to think about: Needs to verify the project deliverables against the enterprise-wide security architecture Needs to verify and adjust access control policy and implementation Needs to change other security policies Needs to change SETA (security education, training, and awareness program) Needs to implement users training Needs to perform security risks assessment after the project implementation and provide final Residual Risks Statement Needs to update Business Continuity Plan (aka Disaster Recovery) Information Technology Project Management, Fifth Edition, Copyright 2007 16

17 Verifying Security Project Scope Review with Information Security department at a minimum Review with Risk Management and Compliance for more serious projects If you have to reduce the scope make sure that the security level is not silently impacted – go with residual risks statement If the project affects end users, talk to them. Make sure that usability remains at the acceptable level Talk to IT people. Make sure that the system non-functional requirements (scalability, performance, flexibility) are not impacted Information Technology Project Management, Fifth Edition, Copyright 2007 17

18 Build WBS on the basis of SDLC There is misunderstanding of SDLC as it would apply to the software development projects SDLC applies to ANY IT project ANY solution assumes Requirements Design Implementation in QA Testing Launch to production Build your WBS on the basis of SDLC Information Technology Project Management, Fifth Edition, Copyright 2007 18


Download ppt "Project Scope Management Information Technology Project Management, Fifth Edition Note: some slides have been removed from the author’s original presentation."

Similar presentations


Ads by Google