What type of project outsourcing model you would use

Assignment Help Management Information Sys
Reference no: EM132294076

Assignment

You will be the IT Manager to improve the performance of the airport's passenger processing system.

The new airport will have faster process timing and better security. New IT system is to make the airport more efficient and more secure. The new advanced IT system will replace the human ID control, Airport check-in and boarding-pass process, with advanced IT System with no human airport officer.

Once installed, in the new airport, the passenger will walk through a passage surrounded with cameras, microphones and other remote readers to do "ID control, Airport check-in and boarding-pass process" all at the same time. The passenger will not interact with any officer at the airport. There will be no direct human interaction at the airport which in long run will reduce the overall expenses and make the airport financially better off.

Additionally, less employees means, less traffic and less parking around the airport. The new stem will be implemented in stages. In stage one only one terminal will be closed for renovation and installation of the new IT system. The install all components of the new IT system must be completed in one week and another week to do all tests. The Airport cannot accept to have a terminal be closed more the two weeks.

The goal is to implement the new system in to all four terminals gradually while only one terminal closed at any given time of the project. The passenger will simply walk through a passage surrounded with well hidden cameras and other remote readers. Each customer will be given and RFID bracelets when they enter to the airport.

The initial airport already has five Terminals. Therefore, five new sections are going to be build (Eventually, all passengers will be passing through these sections). In the new airport, first step, passenger to the get the RFID bracelet at automated kiosk, this is an ATM type machine has face recognition cameras, finger-print reader and connection to DMV and IRS to authenticate the passenger and update the Airport database.

This is the only step where passenger will stop and wait for the machine to put the RFID bracelet on his/her wrist. Then, passenger with RFID bracelet never stops until seating in the aircraft. One Centralized database will record and authenticate each passenger in the airport terminal.

You will be making recommendations for Project Planning Phase for this advanced Airport IT system.

The project are;

Project 1 : Developing software for new IT system (ID control, Airport check-in and boarding-pass process)

Project 2: Selecting and testing the new hardware (RFID bracelet, Cameras, Finger print readers, supporting computers etc. )

Project 3: Preparing the airport structure (remodeling of the terminal), construction

Project 4: Installation of new system and test runs before opening the terminal

Project 5 : Training the airport personnel for the new stem

All this section should be done in 18 months. Airport can not have one terminal closed more than 18 months. Initial Investment for one terminal is $150,000.

Questions

QUESTION 1: Answer the Project Planning Phase Attempts Questions (see slide #4)

QUESTION 2: What type of The Organization and Project Resources you would use for this project? Advantages and Disadvantages of the Organization type you would recommend.

QUESTION 3: What Procurement-Type you would use for the software and hardware needs of the project

QUESTION 4: What type of Project Outsourcing Model you would use? And why?

Reference no: EM132294076

Questions Cloud

Define a transaction with respect to database systems : 1. Define a transaction with respect to database systems. 2. Define the transaction properties outlined by the acronym ACID.
Describe the impact and the vulnerability of the scada : Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.
If a system had no traceability management present : If a system had no traceability management present. What problems could occur when change requests are made.
Act of internet crime took place : Please describe an instance of which you are aware of which an act of internet crime took place.
What type of project outsourcing model you would use : What type of The Organization and Project Resources you would use for this project? Advantages and Disadvantages of the Organization type you would recommend.
Please explain and provide example codes : Please explain and provide example codes for each scenario!
Some databases sort the query results : Some databases sort the query results in ascending order by default... which RDBMS behave this way?
Develop the presentation layer er diagram for rsc case : Develop the Presentation Layer ER Diagram for RSC case. Draw a Chen's notation ER diagram that shows the entity types and relationship types.
Describe the impact of workplace bullying : eflect on a time when you may have witnessed workplace bullying. Discuss at least two practices of workplace bullying addressed.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd