What type of project outsourcing model you would use

Assignment Help Management Information Sys
Reference no: EM132294076

Assignment

You will be the IT Manager to improve the performance of the airport's passenger processing system.

The new airport will have faster process timing and better security. New IT system is to make the airport more efficient and more secure. The new advanced IT system will replace the human ID control, Airport check-in and boarding-pass process, with advanced IT System with no human airport officer.

Once installed, in the new airport, the passenger will walk through a passage surrounded with cameras, microphones and other remote readers to do "ID control, Airport check-in and boarding-pass process" all at the same time. The passenger will not interact with any officer at the airport. There will be no direct human interaction at the airport which in long run will reduce the overall expenses and make the airport financially better off.

Additionally, less employees means, less traffic and less parking around the airport. The new stem will be implemented in stages. In stage one only one terminal will be closed for renovation and installation of the new IT system. The install all components of the new IT system must be completed in one week and another week to do all tests. The Airport cannot accept to have a terminal be closed more the two weeks.

The goal is to implement the new system in to all four terminals gradually while only one terminal closed at any given time of the project. The passenger will simply walk through a passage surrounded with well hidden cameras and other remote readers. Each customer will be given and RFID bracelets when they enter to the airport.

The initial airport already has five Terminals. Therefore, five new sections are going to be build (Eventually, all passengers will be passing through these sections). In the new airport, first step, passenger to the get the RFID bracelet at automated kiosk, this is an ATM type machine has face recognition cameras, finger-print reader and connection to DMV and IRS to authenticate the passenger and update the Airport database.

This is the only step where passenger will stop and wait for the machine to put the RFID bracelet on his/her wrist. Then, passenger with RFID bracelet never stops until seating in the aircraft. One Centralized database will record and authenticate each passenger in the airport terminal.

You will be making recommendations for Project Planning Phase for this advanced Airport IT system.

The project are;

Project 1 : Developing software for new IT system (ID control, Airport check-in and boarding-pass process)

Project 2: Selecting and testing the new hardware (RFID bracelet, Cameras, Finger print readers, supporting computers etc. )

Project 3: Preparing the airport structure (remodeling of the terminal), construction

Project 4: Installation of new system and test runs before opening the terminal

Project 5 : Training the airport personnel for the new stem

All this section should be done in 18 months. Airport can not have one terminal closed more than 18 months. Initial Investment for one terminal is $150,000.

Questions

QUESTION 1: Answer the Project Planning Phase Attempts Questions (see slide #4)

QUESTION 2: What type of The Organization and Project Resources you would use for this project? Advantages and Disadvantages of the Organization type you would recommend.

QUESTION 3: What Procurement-Type you would use for the software and hardware needs of the project

QUESTION 4: What type of Project Outsourcing Model you would use? And why?

Reference no: EM132294076

Questions Cloud

Define a transaction with respect to database systems : 1. Define a transaction with respect to database systems. 2. Define the transaction properties outlined by the acronym ACID.
Describe the impact and the vulnerability of the scada : Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.
If a system had no traceability management present : If a system had no traceability management present. What problems could occur when change requests are made.
Act of internet crime took place : Please describe an instance of which you are aware of which an act of internet crime took place.
What type of project outsourcing model you would use : What type of The Organization and Project Resources you would use for this project? Advantages and Disadvantages of the Organization type you would recommend.
Please explain and provide example codes : Please explain and provide example codes for each scenario!
Some databases sort the query results : Some databases sort the query results in ascending order by default... which RDBMS behave this way?
Develop the presentation layer er diagram for rsc case : Develop the Presentation Layer ER Diagram for RSC case. Draw a Chen's notation ER diagram that shows the entity types and relationship types.
Describe the impact of workplace bullying : eflect on a time when you may have witnessed workplace bullying. Discuss at least two practices of workplace bullying addressed.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the importance of standardized data collection

Analyze the importance of standardized data collection and reporting in health care, and support your response. Next, determine two functions of standardized data collection that could improve the quality of health care services on a global scale...

  Explain the risks that businesses get exposed

Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom).

  Explaining your insights into the operation of trade fair

Analyse a set of data and write a brief report identifying and explaining your insights into the operation of Trade Fair organized by "Home and Office Product Exhibition

  Discuss about the cloud productivity software

You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco.

  What type of project management lifecycle would recommend

You are a Senior Project Manager at XYZ Company; the purchasing department wants to implement a continuous improvement process.

  Explain the purpose of an it security policy

An introduction or overview of IT Security Policiesfor the executive branch of state governments (covering state agencies andoffices in the executive branch including the governor's office). Explain the purpose of an IT security policy and how it ..

  Disseminate this information to all employees

disseminate this information to all employees create individual scenarios. Decide who needs to receive this information and how the information would best be represented in memo format. Keep in mind that you will be calling people to action, and..

  What constraints did you experience and how did you handle

Based on Project management and SDLC, describe an IT or similar business project you have done or are currently doing.

  What are the expected benefits of the blog

List the marketing goals of the blog (page 54). Each goal should be an actionable, SMART objective (pages 54-55). What are the expected benefits of the blog?

  Advice of attorney mark grossman

Do you agree with the advice of attorney Mark Grossman in each of the scenarios - what would your advice be? Explain your positions.

  Discuss ways organizations have built a csirt

Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team? (500-600 words with references)

  How else will you continue to maintain your website

Will you register a domain name and host your website live? If yes, with what host? How else will you continue to maintain your website?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd