Project Mgmt and HR Mgmt Advice and HRMS Implementation

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Modern Systems Analyst and as a Project Manager
Software Quality Assurance Plan
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
NAU HIPAA Awareness Training
Systems Analysis and Design 9th Edition
Crime and Security in the Networked Economy Part 4.
Security, Privacy, and Ethics Online Computer Crimes.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Database Design
Why Managers Must Understand IT Managers play a key role –Frame opportunities and threats so others can understand them –Evaluate and prioritize problems.
Chapter 5: Project Scope Management
Lean Six Sigma: Process Improvement Tools and Techniques Donna C. Summers © 2011 Pearson Higher Education, Upper Saddle River, NJ All Rights Reserved.
Introduction to Systems Analysis and Design
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Managing Projects
Session 3 – Information Security Policies
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4.1.
Management Information Systems
HIPAA PRIVACY AND SECURITY AWARENESS.
Information Systems Security Computer System Life Cycle Security.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
BUSINESS PLUG-IN B15 Project Management.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 4 Project Integration Management.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Introduction to Information Security
Chap1: Is there a Security Problem in Computing?.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Business Plug-In B15 Project Management.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
CONTROLLING INFORMATION SYSTEMS
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CHAPTER 3 Systems Considerations in the Design of an HRIS.
Performance Management, Compensation, Benefits, Payroll, and the HRIS
Chapter 3 Systems Considerations in the Design of an HRIS: Planning for Implementation.
Project Management and HRM Advice for HRIS Implementation
Information Security and Privacy in HRIS
Systems Analysis and Design in a Changing World, 4th Edition
Introduction to the Federal Defense Acquisition Regulation
Managing Multi-user Databases
County HIPAA Review All Rights Reserved 2002.
Project Management Process Groups
Cyber security Policy development and implementation
Introduction to the PACS Security
System Design and Acquisition
Presentation transcript:

Project Mgmt and HR Mgmt Advice and HRMS Implementation Module 5

Module 11 Objectives Understand how the use of PM approaches, techniques, and tools help throughout the entire SDLC  Be able to describe what factors are used to develop program evaluation and review technique (PERT), critical path method (CPM), and Gantt charts  Understand how monitoring the project activities carefully on a Gantt chart will ensure project completion on time Be able to construct a Gantt chart Understand how Six Sigma can be used in HR and project management Understand how the combination of knowledge from the IT and HRM literature makes the development and implementation of the HRIS successful Be able to describe how IT factors can affect HRIS project success Understand how knowledge from HRM literature provides guidance for handling the behavioral problems and issues that arise in HRIS development Understand the different roles of the steering committee, the CBA team, and the PM team in the HRIS project Be able to describe how training and documentation are important to both the development and implementation of an HRIS Be able to describe how critical success factors affect the success or failure of an HRIS project. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Chapter 6 Project Management and HRM Advice for HRIS Implementation Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

STATISTICS It Has Been Estimated That The Failure Of HRIS Projects Costs Organizations In The United States Alone At Least $100 Billion A Year (Ewusi-Mensah, 1997). Of Those Systems That Are Completed, More Than 55% Will Exceed Cost And Time Estimates By A Factor Of 2. Only 13% Of The IS Projects That Are Completed Are Considered Successful By The Executives Who Sponsor Them Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

PROJECT MANAGEMENT PHASES Initiation Development Of Project Concept And Project Proposal (Project Charter) Required Tasks Work Breakdown Structure Work Plan & Packages Project Execution Tracking And Periodic Progress Reports Project Close-out Implementation, Evaluation And Maintenance Of The HRIS Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

PROJECT MANAGEMENT QUALITY CONSIDERATIONS Six Sigma Used To Assess The Effectiveness Of HR Processes Define, Measure, Analyze, Improve And Control (DMAIC) Approach Develop An Overall Work Plan Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

PM APPROACHES AND TOOLS Performance Evaluation And Review (PERT) The Critical Path Method (CPM) Gantt Chart Major Benefit Is A Tighter Control Over The Process To Ensure Successful Implementation Of The HRIS. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

PM APPROACHES AND TOOLS: PERT Method For Analyzing The Tasks Involved In Completing A Given Project, The Time Needed To Complete Each Task, And The Minimum Time Needed To Complete The Total Project. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

PM APPROACHES AND TOOLS: CPM Uses A Mathematically Based Algorithm For Scheduling A Set Of Project Activities Developed By Dupont And Remington Rand Corporation For Managing Plant Maintenance Projects. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

PM APPROACHES AND TOOLS: GANTT A Graphical Representation Of The Duration Of Tasks Against The Progression Of Time In A Project. Most People Have Probably Constructed A Gantt Chart In Formally Without Realizing That They Had Done So. Instructions For How To Develop A Gantt Chart And Then Covert It To A Pert Chart Are Contained In The Following Website: Http://Ganttproject.Biz/. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Example of a Gantt Chart Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

IT FACTORS AFFECTING PM SUCCESS Solve The Right Problem. Have Systems Developers Who Are Sensitive To Hr Issues And Willing To Learn About The Constraints In Hr Functionality. Have Project Managers Who Understand The Dynamic Nature Of Any HRIS Project And The Interrelations Among Various Factors In Addition, Three General Factors That Affect Successful PM Are Time, Cost, And Scope. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

THE HRM PERSPECTIVE: ORGANIZATIONAL REQUIREMENTS 1. Identification Of Steering Committee And Project Charter Selection Of Project Sponsor 2. Configuring The PM Team Representatives From The Functional Units Affected, Most Notable HR And IT Team Training 3. Identification Of Available Resources And Constraints Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

THE HRM PERSPECTIVE: ORGANIZATIONAL REQUIREMENTS 4. Controlling Project Creep Project Creep Is Defined As The Enlargement Of The Original Boundaries Of The Project As Defined In The Project Charter. 5. Selection Of The Implementation Team The Implementation Team Also Has Primary Responsibility For Communication With The Entire Organization Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

THE HRM PERSPECTIVE: ORGANIZATIONAL REQUIREMENTS 6. Training And Documentation Complete, Accurate, And Up-to-date Documentation Of The System Is Critical For The Implementation Of A Successful HRIS. Training In Both Group Processes And “Change Management” Methods. Training On The New System Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Barriers to Success Inadequate resources – Lack of management commitment Project team instability Organizational Politics Poor needs analysis Omission of key persons on project team Failure to include key groups in needs analysis Inadequate control/involvement by HR Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Critical Success Factors Top Management Support Provision Of Adequate & Timely Resources Ongoing Communication Conducive Organizational Culture User Involvement Project Champions (Steering Committee) Organizational Structure Change Management Methodology Project Control & Monitoring Cross Integration Between Business Systems Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Creating an Environment of Motivation Consider rewards of recognition. They don’t have to be large, but they need to be a standard part of operating procedures to create a motivating project environment. Be sure to include all project employees, not just the highly visible ones, or those above a certain rank. Recognizing work done well and keeping communications open are the two most important operating procedures for any project manager. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Information Security and Privacy in HRIS CHAPTER 16 Information Security and Privacy in HRIS

INTRODUCTION A Great Deal Of Confidential Information Employees are Captured and Stored by Organizations Employee Personal Details Pay And Benefits History Medical Records Disciplinary Records Data Are Stored Electronically And Transmitted Across Networks. Increasing Integration Of HRIS Has Made Information Security Management A Complex And Challenging Undertaking Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

Information Security in HRIS Protecting Information In The HRIS From Unauthorized Access, Use, Disclosure, Disruption, Modification, and estruction Objectives of Information Security Protect Confidentiality, Integrity And Availability Of Information (Pfleeger, 2006; Wong, 2006b). Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

COMPONENTS OF INFORMATION SECURITY Three Main Principles Of Information Security Confidentiality Integrity Availability The HRIS Is Composed Of Three Components Hardware Software Communications As Mechanisms Of Protection Physical Personal Organizational Levels Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

COMPONENTS OF INFORMATION SECURITY Figure 16.1 SOURCE: Wikipedia (2007) Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

LEGAL REQUIREMENTS FOR INFORMATION TECHNOLOGY Personal Information Protection And Electronics Document Act (Canada) Supports And Promotes Electronic Business By Protecting Personal Information That Is Collected, Used Or Disclosed Security Breach Notification Law (California, USA) Requires Organizations To Notify Customers Or Employees When Unencrypted Personal Information May Be Compromised, Stolen Or Lost. Computer Misuse Act 1990 (UK) Proposed To Make Computer Crime (e.g. Hacking Or Cyber-terrorism) A Type Of Criminal Offense. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

LEGAL REQUIREMENTS FOR INFORMATION TECHNOLOGY (Cont.) The European Union Data Protection Directive (EUDPD) Requires That All EU Members Must Adopt National Regulations To Standardize The Protection Of Data Privacy For Citizens Throughout The European Union. Health Insurance Portability And Accountability Act (USA) Sets National Standards for Electronic Healthcare Transactions and Requires Healthcare Providers, Insurance Companies And Employers To Safeguard The Security Of Health Information Of Individuals. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

THREATS TO INFORMATION SECURITY Human Errors In Data Entry & Handling Damage By Employee Disgruntled & Ill-informed Employees: Critical Role Of HR Misuse Of Computer Systems: Unauthorized Access To Or Use Of Information Computer-based Fraud Viruses, Worms & Trojans: Cyber Terrorism Hackers Natural Disasters Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

BEST PRACTICES IN HR INFORMATION SECURITY Adopt A Comprehensive Privacy Policy Store Sensitive Personal Data In Secure Computer Systems And Provide Encryption Dispose Of Documents Properly Or Restore Computer Drives And CD-ROMs Build Document Destruction Capabilities Into The Office Infrastructure Conduct Regular Security Practice Training Conduct Privacy “Walk-throughs” (Canavan, 2003; David, 2002; Tansley & Watson, 2000) Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

ADDITIONAL BEST PRACTICES IN HR INFORMATION SECURITY The Careful Selection Of Staff with Regard to their Honesty and Integrity Raise Information Security Awareness and Ensure Employees Understand Corporate Security Policies Institute Measures To Address The Personal Problems Of Staff, Such As Gambling And Drug Addictions, Which Might Lead Them Indulge In Abuse For Financial Gains Provide Access To Effective Grievance Procedures Since The Motivation For Much Computer Abuse Is Retaliation Against Management Kovach, Hughes, Fagan, and Maggitti (2002) Grundy, Collier, and Spaul (1994) Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

INFORMATION SECURITY MANAGEMENT FOR HRIS ISO/IEC 27002 Administrative/Procedural Logical/Technical Physical Controls Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

INFORMATION PRIVACY Comprises Ethical, Moral, And Legal Dimensions And Has Assumed Greater Importance With The Increased Adoption Of The Internet And Web 2.0. Privacy Is A Human Value Consisting Of Four Elements (Kovach & Tansey, 2000): Solitude: The Right To Be Alone Without Disturbances Anonymity: The Rights To Have No Public Personal Identity Intimacy: The Right Not To Be Monitored Reserve: The Right To Control One’s Personal Information Including The Methods Of Dissemination Of That Information. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

CONTROLLING ACCESS TO HR DATA Administrative Controls Logical (Technical) Controls Physical Controls Security classification for Information Access control Cryptography Defense in depth Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

INFORMATION PRIVACY AND HRIS Concerns Types Of Employee Information that Can be Collected And Stored In The System Who Can Access And Update The Information (Noe et al., 1994; Sadri & Chatterjee, 2003) Considerations Collect and store information Based On Sound And Valid Business Reasons (Hubbard Et Al., 1998) Collect only information which is Necessary, Lawful, Current, And Accurate (Camardella, 2003) Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

HRIS SECURITY BEST PRACTICES Train Users On How To Securely Use And Handle The Equipment, Data, And Software. Train Employees To “Log Off” Personal Computers After They Are Through Using Them. Do Not Allow Passwords To Be Shared. Change Passwords Frequently. Run Software Through A Virus-detection Program Before Using It On The System. Ensure That Backup Copies, Data Files, Software, And Printouts Are Used Only By Authorized Users. (Noe et al., 1994; Pfleeger, 2006) Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.

HRIS SECURITY BEST PRACTICES Make Backup Copies Of Data Files And Programs. Ensure That All Software And Mainframe Applications Include An Audit Trail (A Record Of The Changes And Transactions That Occur In A System, Including When And Who Performed The Changes). Use Edit Controls (Such As Passwords) To Limit Employees' Access To Data Files And Data Fields. Employees Take Responsibility For Updating Their Employee Records Themselves Via The Self-service System. (Noe et al., 1994; Pfleeger, 2006) Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc.