Activity 4- Project Risk and quality

#1.  Tessile, S. A., a company based in Turin, Italy, is a medium-size company that manufactures, sells, and exports textiles. An increased demand for the company’s high-quality textiles has led to the approval by its CEO, Giuseppe Franco, to implement a major expansion to other markets. Mr. Franco is seen as a visionary leader in the textile industry as he transformed a cotton plantation company into one of the major textiles companies in northern Italy.Mr. Franco recently led an aggressive and successful series of acquisitions of wineries in southern and central Italy. Mr. Franco wants to follow these acquisitions by purchasing and introducing Tessile S.A. to the tourist and cheese industries. However, these last winery acquisitions left the company in serious debt and with its shares losing value due to the perceived negative view of Mr. Franco’s strategy by its shareholders moving away from their core textile business.You have been assigned to advise Tessile, S.A. board of directors on identifying potential hazards, threats, and risks of Tessile’s business strategies.Create a document presentation that consists of at least 7 sections as to considerations and process. Be sure to include the following information in your packet:

  • Explain the process you will use to identify potential hazards, threats, and risks of the company’s current business strategies.
  • Identify the potential hazards, threats, and risks that you discovered when using your process.

Be sure to include notes in your presentation where necessary. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.Requirements:

  • There is no minimum or maximum required number of pages. Your response will be considered complete, if it addresses each of the components outlined above.
  • Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

CIS

Step One: Select the current chapter being covered in lecture in class about which you want to comment. (See the schedule below.)

Step Two: Use the “Packback Questions” link on the Home page to access Packback.

Step Three: Click on “Ask a New Question” and type in the question that you want to ask pertaining to the chapter being covered this week. Remember to use open ended questions.

Step Four: Find an external source that supports your question.

Step Five: Use paragraphs and don’t make spelling errors. Check your Curiosity score and make sure that it’s at least an 80.

E-Commerce and Micropayments

 

This week your rotation assignment takes you to the Office of the Chief Financial Officer (CFO).

An external audit of the company’s financial operations has just been completed. Last week, an “early look” copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO’s staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise — Shadow IT — the unauthorized / unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included:

1. Micro payments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card’s account via a credit card charge. Guest services also credits some of these payment card accounts with “reward dollars” for guests who belong to the hotel’s affinity program. The payment cards are used at service locations which do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third party service provider which then uses an electronic funds transfer to pay the hotel its share of the income.

2. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include: private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider’s cell phone. The payment accounts which receive the guests’ payments are connected to the hotel’s merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income.

The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a “cease and desist” directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues.

Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on the micro payment cards. Team #2 will focus on the mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.)

Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a 2 page summary of the important points from your readings. You have also been asked to help identify and describe / explain 5 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO’s effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)

Provide in-text citations and a reference list at the end of your summary paper (APA format recommended).

BLOCK CHAIN FINAL

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts.Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

BYOD

  

Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.

Integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

1. Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.

2. Recommend methods organizations can use to address the challenges associated with BYOD policies.