Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title Assessor Unit(s) BTEC HND in Computing Mrs. Anne Sumudu Internal Verifier Unit 06: Managing a Successful Computing Project Managing a Project on cyber security risks due to Remote working Assignment title Student’s name Niluksha Dulmina List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Higher Nationals – Summative Assignment Feedback Form Student Name/ID E126643 Niluksha Dulmina Unit Title Unit 6 Managing a Successful Computing Project Assignment Number 1 Assessor Submission Date DateReceived1stsub mission Re-submission Date DateReceived2ndsubmissio n Mrs. Anne Sumudu Assessor Feedback: LO1.Establish project aims, objectives and time frames based on the chosen theme Pass, Merit & Distinction P1 P2 P3 M1 Descripts LO2. Conduct small-scale research, information gathering and data collection to generate knowledge to support the project Pass, Merit & Distinction Descripts P4 M2 D1 LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis. Pass, Merit & Distinction P5 P6 M3 D2 Descripts LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable organisational performance Pass, Merit & Distinction P7 M4 D3 Descripts Grade: Assessor Signature: Date: Assessor Signature: Date: Resubmission Feedback: Grade: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Niluksha Dulmina MSCP Assignment 01 Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Date ndulmina99@gmail.com Student signature Niluksha Dulmina Date MSCP Assignment 01 Pearson Higher Nationals in Computing Unit 6: Managing a Successful Computing Project Niluksha Dulmina MSCP Assignment 01 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 3. Ensure that you give yourself enough time to complete the assignment by the due date. 4. Excuses of any nature will not be accepted for failure to hand in the work on time. 5. You must take responsibility for managing your own time effectively. 6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 7. Failure to achieve at least PASS criteria will result in a REFERRAL grade. 8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. 9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Niluksha Dulmina MSCP Assignment 01 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct way. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of the Pearson UK. 3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the attached. Student’s Signature: ndulmina99@gmail.com (Provide E-mail ID) Niluksha Dulmina Date: 2022/10/10 (Provide Submission Date) MSCP Assignment 01 Higher National Diploma in Computing Assignment Brief Student Name /ID Number E126643 Niluksha Dulmina Unit Number and Title Unit 6: Managing a Successful Computing Project Academic Year 2021/20222018 Unit Tutor Assignment Title Vulnerability Assessment - Management Information System Project Issue Date Submission Date IV Name & Date Submission Format: The submission should be in the form of an individual report written in a concise, formal business style using single spacing (refer to the assignment guidelines for more details). You are required to make use of headings, paragraphs, and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please provide in-text citation and a list of references using Harvard referencing system. Please note that this is an individual assessment and your report should include evidences to that you have conducted a research to collect relevant data individually. Niluksha Dulmina MSCP Assignment 01 Unit Learning Outcomes: LO1 Establish project aims, objectives and timeframes based on the chosen theme. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project. LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance. Niluksha Dulmina MSCP Assignment 01 Assignment Brief and Guidance: Research Theme: Remote working Research Topic: What are the key cyber security risks of working remotely e.g. employees downloading unsecure apps or sharing their work devices with family members? “The option to work remotely was already being embraced by some businesses in the pre-pandemic era. These businesses were making some progress to adapt their working practices to accommodate remote working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or two a week. However, on the whole there had been a reluctance to have staff working remotely and this has largely centred around productivity concerns, security implications and technology issues. The global pandemic however necessitated and accelerated the move to remote working. The vast majority of businesses have now shifted some or all of their operations online, and almost all of their staff are working from home. The enabling force behind this necessary shift has been the different technologies and platforms that facilitate workers to achieve business goals remotely. This sudden shift to remote working took place within weeks and months and has not been without issues. Several surveys conducted during this period cited business leaders complaining about how technology problems have impacted their business and employees while working remotely. The biggest issues remote workers face are being frequently disconnected from corporate networks, slow file downloads, poor quality of video meetings and long response times when loading apps. As a result, building secure, effective and integrated technology capability, to continue this flexibility in the workforce, has now become a priority for all organizations”. (Pearson, 2020) You are expected to carry out small-scale research in order to explore the cyber security risks of working remotely due to the pandemic, from the standpoint of a computing professional. The research that you carry out can be based on an organization that you have access to gather sufficient information to investigate the cyber security risks of remote working. The report should include, Niluksha Dulmina MSCP Assignment 01 A comprehensive project management plan Evaluation of data collection methods and data analysis tools and/or techniques should be provided Appropriate recommendations should be provided Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance TASK – 01 1.1 Define the scope of the project and devise aims and objectives of the project that you are going to carry out. You also should include a brief introduction to the selected company, remote working process and technologies used, explanation to the project and other relevant information about the research. 1.2 Produce a comprehensive project plan including the following. Cost, scope, time, quality, communication, risk, and resources management plan Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones Gannt chart to illustrate project schedule with realistic time allocated for each activity and clearly defined deadlines for milestones. TASK – 02 Carry out research to investigate the cyber security risks of remote working by applying appropriate qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the appropriateness of the research methods applied. your answer also should include a critical evaluation of the project management process and a justification to the selected research methodologies. TASK – 03 Niluksha Dulmina MSCP Assignment 01 3.1 Analyze research data collected to support your research project using appropriate tools, techniques and critically evaluate how selected tools, techniques uphold authenticity and the accuracy of the data collected. 3.2 Draw valid conclusions and recommendations from the research data analyzed and communicate your recommendations to the top management of the organization through an action plan. The action plan should include a justification to the recommendations suggested. TASK – 04 4.1. Reflect on the objectives of the cyber security risks project and your own learning experience gained through following quality research and the project management process. Critically evaluate the ways in which the research project carried out supports the organization to sustain its performance/ security in a remote working environment and how the project supported you to improve your own learning and performance. Niluksha Dulmina MSCP Assignment 01 Grading Rubric Grading Criteria Achieved Feedback LO1 Establish project aims, objectives and timeframes based on the chosen theme P1 Devise project aims and objectives for a chosen scenario. P2 Produce a project management plan that covers aspects of cost, scope, time, quality, communication, risk and resources. P3 Produce a work breakdown structure and a Gantt Chart to provide timeframes and stages for completion. M1 Produce a comprehensive project management plan, milestone schedule and project schedule for monitoring and completing the aims and objectives of the project. LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to support the project P4 Carry out small-scale research by applying qualitative and quantitative research methods appropriate for meeting project aims and objectives. M2 Evaluate the accuracy and reliability of different research methods applied. D1 Critically evaluate the project management process and appropriate research methodologies applied. LO3 Present the project and communicate appropriate recommendations based on meaningful conclusions drawn from the evidence findings and/or analysis P5 Analyze research and data using appropriate tools and techniques. Niluksha Dulmina MSCP Assignment 01 P6 Communicate appropriate recommendations as a result of research and data analysis to draw valid and meaningful conclusions. M3 Evaluate the selection of appropriate tools and techniques for accuracy and authenticity to support and justify recommendations. D2 Critically evaluate the research and data analysis tools used in the project development stages. LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable organizational performance P7 Reflect on the value of undertaking the research to meet . stated objectives and own learning and performance. M4 Evaluate the value of the project management process and use of quality research to meet stated objectives and support own learning and performance. D3 Critically evaluate how the project supports sustainable organizational performance. Niluksha Dulmina MSCP Assignment 01 Unit 6: Managing a Successful Computing Project Assignment 01 Assignment Name : Managing a Successful Computing Project Student Name : Niluksha Dulmina Student ID : E126643 Batch No : HND-COM SEP/OCT WEEKDAYS Lecturer Name : Mrs. Anne Sumudu Name of Institute : ESoft Metro Campus Date of Submission : 2022-10-10 Niluksha Dulmina MSCP Assignment 01 Acknowledgement This is to acknowledge all those without whom this project would not have been reality. Firstly, I would wish to thank our Computer Science teacher Mrs. Ann who gave his immense support, dedicated her time towards it and made us understand how to make this project. Without her guidance, the project would not have been complete. Niluksha Dulmina MSCP Assignment 01 Niluksha Dulmina MSCP Assignment 01 Table of Contents 1 TASK............................................................................................................................... 21 Niluksha Dulmina MSCP Assignment 01 Define the scope of the project and devise aims and objectives of the project that you are going to carry out. You also should include a brief introduction to the selected company, remote working process and technologies used, explanation to the project and other relevant information about the research. ....................................................... 21 1.1 What is Project Management? ............................................................................... 21 The use of procedures, techniques, abilities, knowledge, and experience to accomplish particular project goals in accordance with predetermined guidelines is known as project management. Final deliverables in project management are subject to a limited amount of time and money. ................................................................................. 21 1.1.1 Why is project management important? ....................................................... 22 1.1.2 What does project management involve? ...................................................... 27 1.1.3 Summary of the the project ........................................................................... 27 1.1.4 Information about SLT company .................................................................. 28 1.1.5 Initiation of the project and project planning phase .................................... 29 1.2 2 Produce a comprehensive project plan including the following. ........................ 29 1.2.1 Work breakdown structure ............................................................................ 33 1.2.2 Project summary .............................................................................................. 34 1.2.3 Project overview ............................................................................................... 34 1.2.4 Gantt chart ....................................................................................................... 36 TASK............................................................................................................................... 37 Carry out research to investigate the cyber security risks of remote working by applying appropriate qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the appropriateness of the research methods applied. your answer also should include a critical evaluation of the project management process and a justification to the selected research methodologies. ....... 37 2.1 Project execution phase .......................................................................................... 38 What is data collection? ................................................................................................. 38 2.1.1 Qualitative vs quantitative research............................................................... 41 2.1.2 The cyber security risks of working from home ........................................... 43 2.1.3 Field work ......................................................................................................... 48 2.1.4 Remote Agile: Observations on productivity for less mature teams by SLT Mobitel 55 2.1.5 Observation 1: Limited informal learning when working remote .............. 56 2.1.6 other Observation 2: Accountability and trust are hard when you can’t see each 57 2.1.7 Observation 3: Team chat and instant messaging are great, but they can cause implicit bottlenecks .............................................................................................. 57 2.1.8 Observation 4: Non-work interactions can help the team member engage 58 2.1.9 Key findings ...................................................................................................... 59 Niluksha Dulmina MSCP Assignment 01 3 2.1.10 Questions to Assistant Managers .................................................................... 60 2.1.11 Questions to SLT Company Workers ............................................................ 62 TASK............................................................................................................................... 64 3.1 Analyze research data collected to support your research project using appropriate tools, techniques and critically evaluate how selected tools, techniques uphold authenticity and the accuracy of the data collected. .......................................... 64 3.1.1 What Is Data Analysis? ................................................................................... 64 3.1.2 Why is Data Analysis Important? .................................................................. 64 3.1.3 Data Analysis about SLT-Mobitel ................................................................. 65 3.1.4 Data Analysis Tools.......................................................................................... 66 3.1.5 Types of Data Analysis Methods .................................................................... 68 3.1.6 Data Analysis consists of the following phases: ............................................. 71 3.2 Interpretation .......................................................................................................... 73 3.2.1 Are developers who work remotely more satisfied with the job? ............... 73 3.2.2 Do remote employees make more money? ..................................................... 74 3.2.3 What are the most common challenges faced when working remotely? .... 75 3.2.4 In what type of organizations are remote work popular?............................ 76 3.2.5 Fundamental Types of Interviews in Research ............................................. 76 3.2.6 Structured Interviews ...................................................................................... 77 Structured interviews are research techniques that are exceedingly rigorous in their operations and give very little or no opportunity for pushing participants to collect and assess data. As a result, it is also known as a standardized interview, and its methodology is heavily quantitative. The questions in this interview are redecided based on the level of detail requested. ....................................................................................... 77 3.2.7 Personal Interviews .......................................................................................... 77 3.2.8 Telephonic Interviews...................................................................................... 78 Because of the logistics and time savings, telephone interviews are quickly replacing traditional "on-site" interviews. It is now more convenient for candidates to have a phone chat than go to a faraway place. Although the fact that the individual does not have to be physically present during the interview is a clear advantage, it may also be one of its distinguishing downsides. ................................................................................ 78 3.2.9 4 Email or Web Page Interviews ....................................................................... 79 TASK............................................................................................................................... 80 4.1 Advantages of Assignments .................................................................................... 80 Assignments are provided to children in order to bridge the gap between what they learn at school and what they study at home. Assignments are expected to create the required papers that may be used for further research. To complete the assignment properly, the statement or question they attempt must be entirely comprehended. .................................. 80 4.1.1 Technical advantages of assignment writing: ............................................... 80 Niluksha Dulmina MSCP Assignment 01 4.2 How to face Cyber Security Risks SLT Mobitel company about “Ananda Samakoon” opinion............................................................................................................ 82 4.2.1 Reflect on your own learning experience in the Cybersecurity Vulnerability Project. .................................................................................................... 84 4.2.2 State the cybersecurity project objectives derived from the project management process ...................................................................................................... 84 4.2.3 Explain how the research project will assist the organization in maintaining its performance/security in a remote work environment? ................... 85 4.2.4 Key to successful learning: aligning assessment with learning outcomes ... 85 4.2.5 Designing assessments which allow students to demonstrate their achievement of the learning outcomes ...................................................................... 86 5 4.2.6 Key assessment terms ...................................................................................... 86 4.2.7 Evaluation of continuing professional development ..................................... 87 4.2.8 Reflection of the work ...................................................................................... 88 4.2.9 Future Research ............................................................................................... 89 4.2.10 Important of project management ................................................................. 89 Reference ........................................................................................................................ 90 Niluksha Dulmina MSCP Assignment 01 1 TASK Define the scope of the project and devise aims and objectives of the project that you are going to carry out. You also should include a brief introduction to the selected company, remote working process and technologies used, explanation to the project and other relevant information about the research. 1.1 What is Project Management? The use of procedures, techniques, abilities, knowledge, and experience to accomplish particular project goals in accordance with predetermined guidelines is known as project management. Final deliverables in project management are subject to a limited amount of time and money. A basic project management lifecycle covers four stages: Initiation Planning Niluksha Dulmina MSCP Assignment 01 Execution Closure 1.1.1 Why is project management important? Project success depends on having a project manager to take the initiative and keep everyone on the same page because projects are frequently complex and include several stakeholders. Here are six reasons why you should use project management: Realistic project planning: One cannot stress the value of project planning. Organizations frequently overestimate their ability to do tasks fast, underestimate the expenses, or do both, which is a formula for disaster. An effective project manager establishes goals, budgets, and schedules that are reasonable and doable while taking the larger picture into account. A project may swiftly veer off course before it even gets started without attentive management. The project manager consults with various stakeholders to gain an understanding of the initiative's strategic priorities and business objectives in order to determine reasonable goals, budgets, and timetables. The project manager develops a project plan based on Niluksha Dulmina MSCP Assignment 01 their study, balancing those goals within the limitations of time and money. Resource management, cost estimation, and risk analysis are all part of this process. Clear focus and objectives: The most frequent factor contributing to project failure in 2017 was unclear goals. Project managers assist businesses in defining their priorities and project goals. The scope and objectives can quickly become jumbled when project management is left up to the team. Scope creep, missing deadlines, and overspending can result from a lack of concentration. In addition, many teams might not be able to identify possible risk factors as they emerge without a project manager to supervise the project plans and job breakdowns. The team may decide to prioritize the wrong tasks if they don't handle the changing project risks. Niluksha Dulmina MSCP Assignment 01 Strategic alignment: Aligning projects with corporate strategy is one of the most crucial reasons to utilize project management. "If your company is not strong at project management, you are putting too much at risk in terms of eventually delivering on plan," warns Mark Langley, president and CEO of PMI. In other words, organizational strategy is driven by project management. Therefore, you are losing a significant chance to develop if you aren't using it into your activities. The general objectives of a project, as well as its succeeding tasks and milestones, are all made sure to be in line with the organization's strategy by project managers as they supervise the planning and implementation of a project. Your efforts will advance the company if they are strategically aligned at every stage of the project, which keeps all stakeholders on the same page. Niluksha Dulmina MSCP Assignment 01 Managed process: The goal of project management is to enable the appropriate people do the right tasks at the right time in a proactive manner. Many teams tend to operate reactively handling problems as they come upon the absence of a defined project management methodology, as opposed to anticipatorily preparing for known risks and establishing project goals and parameters from the start. Project managers work with teams to divide a project into smaller, more manageable chunks. Project managers may better manage their teams and respond to problems by dividing the project down into a defined procedure with assigned tasks, dates, and milestones. Quality control: Project management is not complete without quality control. Even if your project is completed on schedule and within the allotted budget, it will still be considered unsuccessful if the quality requirements aren't satisfied. Sadly, it's all too simple to slip into this trap. Teams under a lot of pressure to complete a project on schedule and within a certain budget. And this could result in hurried effort and subpar performance. Project managers are useful in this situation. They oversee how well project duties are carried out in addition to managing timelines and objectives. To ensure that everyone Niluksha Dulmina MSCP Assignment 01 is working toward the same goals, project managers assist in defining quality standards and deliverables. Reduced costs: In 2018, 9.9% of every dollar invested was lost owing to subpar project execution, or $99 million for every $1 billion invested, according to PMI. Through increased productivity, risk mitigation, and resource optimization, project management lowers project costs. Even with the additional expense of hiring a project manager, businesses stand to benefit far more. Niluksha Dulmina MSCP Assignment 01 1.1.2 What does project management involve? Kick-off meeting: Lay up the facts you have and share the team's aims and high-level objectives. Stakeholder analysis: The people who will be impacted the most by the initiative should be contacted. Project scope definition: Determine the scope, deliverables, and all requirements. Work Breakdown Structure (WBS): Break up the project phases into more readily managed, manageable bits of labor. Risk management planning: Determine and prepare for the risks that are most likely to arise during a project's life cycle. Project review: Concluding a project with a debriefing to extract lessons that can be included into the organization's knowledge base or best practices 1.1.3 Summary of the the project IT security for remote employees is one of the numerous challenges that firms must address as they get ready for what life will be like after a pandemic. Having a remote workforce has several risks. To finish duties, employees occasionally use their own devices and home networks. And you better hope they have technological know-how because your IT team can only do so much to assist them if they run into any technical problems. About 65% of remote employees reported experiencing IT issues during the pandemic, and 52% had to wait up to three hours for the issue to be handled, according to the Velocity Smart Technology Market Research Report 2022. However, remote work is here to stay, for better or worse, and the advantages are quite alluring. In fact, a Gartner poll revealed that 47% of companies provide workers a choice in their jobs. When asked if they could work remotely full-time when the epidemic is over, 82% of respondents claimed they could do so at least once a week. Sri Lanka Telecom (SLT) is one of the firms that gives workers the option to work remotely. Employees should evaluate the company's remote working policies to see Niluksha Dulmina MSCP Assignment 01 whether they are acceptable. A business has just one second before a catastrophe occurs. 1.1.4 Information about SLT company SLT-Mobitel is Sri Lanka’s National Mobile Service Provider and a fully owned subsidiary of Sri Lanka Telecom. The company offers mobile telephony services, high-speed broadband, Enterprise Solutions, IDD Services, Mobile Money (mCash) and a host of Value-Added Services. SLT-Mobitel was the pioneer in South Asia to launch the first Super-3.5G HSPA network in South Asia in 2007, and subsequently trialed HSPA+, MIMO (Multiple Input Multiple Output) in 2009, another first in the region, Mobitel went on to demonstrate 4G-LTE technology also for the first time in South Asia in 2011. Accordingly, SLT-Mobitel launched its 4G-LTE Network in 2013 to provide unparalleled broadband experience to Sri Lankans. Keeping ahead with pioneering new technologies, SLT-Mobitel trialed 4.5G LTE-Advanced Pro Technology with CA (Carrier Aggregation) of three bands, again for the first time in South Asia in 2016. In 2017, SLT-Mobitel was able to deploy the first Sub-1G Mobile Broadband Network in Sri Lanka based on 900MHz spectrum innovatively to provide superior coverage some rural areas of the country. In 2018 Mobitel launched the First Commercial 4.5G/4G+ Mobile Network in South Asia. In April 2019, SLT-Mobitel was the first network in South Asia to successfully showcase the first 5G deployment over a Mobile Network by connecting a commercial Mobile smartphone to its 5G network. Fueling over USD 700mn worth of investments to-date, SLT-Mobitel has shaped the ICT landscape, experiencing exciting growth – Niluksha Dulmina MSCP Assignment 01 poised to lead the industry into its next phase of development. A growing customer base stands testament to SLT-Mobitel’s strong focus laid on customer centricity. For more information, visit www.sltmobitel.lk or dial 1717 to reach the Customer Care Hotline. 1.1.5 Initiation of the project and project planning phase The purpose of this study is to comprehend how the severe Covid-19 epidemic, which started in March 2020 and is still running strong as of this writing, may affect slightly distant and hybrid work arrangements. Here, study goals should be on the psychological agreement that exists between staff and management, especially considering cyber danger. Recognize how various firms have maintained or decreased their exposure to cyber risk while implementing new methods of functioning. Examine the methods employed by leaders in cyber security to promote and maintain a proactive attitude toward cyber security. The best ways to safeguard team members' emotional well-being and physical health, and to sustain the effectiveness of teamwork. 1.2 Produce a comprehensive project plan including the following. Niluksha Dulmina MSCP Assignment 01 Purpose: Purpose of this research is to study how the abrupt transition to remote work effects managers and employees, and to see whether, and in what ways, the involuntary nature of the current remote work situation changes how remote work is perceived by employees and managers. Crises are something that we know occur at different times, such as the IT-crisis in the 2000s and the economic crisis in 2008 and now the corona crisis. This thesis is timeless in that way that it can be useful for managers and employees to read and learn what opportunities and challenges remote work brings and how to manage a crisis by changing the way of working in a smooth way. This session offers the chance to prepare and learn about remote work so that you can effortlessly convert from traditional office work to remote work in times of crisis, even if the COVID-19 crisis is most likely not the last one. It will be possible to discover more about how people in both jobs are adjusting to working remotely, as well as what managers see as hurdles and potential, and whether there are any specific challenges among employees, by interviewing both employees and managers. Managers will find our study useful in understanding both their own organizations and how other managers respond to similar situations. Our study will be crucial for fostering more openness between managers and employees. There are benefits and drawbacks to working remotely, and management should communicate more if there are issues, they really aren't aware of. The key to remote work's effectiveness is knowing how to manage its drawbacks while keeping its benefits. Whether the experience is short-term or long-term, the business must think that the guidance offered by subject-matter specialists may lessen some of the problems faced by both employees and managers. Many people's everyday tasks have altered as a result of the crisis, and it is intended that the this thesis will show them how. Costs management plan : Cost estimation comes when the project manager calculates the cost of the resources selected during resource planning at this stage. Due to the complexity of cost estimation, the project manager must estimate the cost carefully and accurately by considering a number of different aspects. The most Niluksha Dulmina MSCP Assignment 01 constant elements are overhead costs, corporate budgets, inflation, and fixed and variable costs. It is important to remember that accuracy in cost estimates is essential because the greater the difference between the projected cost and the actual cost, the less likely the project will be successful. Many estimation methods and models should be used, including analog estimation, parametric modeling, and the program evaluation and review method. Scope management plan: Given that this crisis situation is unusual, studying a topic as current as this is of utmost theoretical relevance. This extensive shift offers considerable opportunity for remote work for many employees and supervisors. Even though the opportunity, time, and scope for testing telework theory are somewhat constrained, this research should nevertheless offer valuable information that can be used to enhance the study of telework. Given the abrupt and unanticipated move to remote work, this circumstance will really test the trade-offs of remote work in terms of productivity vs socializing and isolation. Quality management plan : The most crucial aspect of every project is the project's quality. A project manager must maintain excellent quality to ensure that the best end results are delivered to stakeholders and clients. As a result, project quality management is a critical part of the project. However, the challenge that emerges here is how to assure the project's quality. Here comes the project quality management plan! A project quality management plan specifies specific project requirements, project deliverables, quality measurements, and quality assurance and improvement procedures. Indicators of key performance KPIs and other quality measurements and indicators aid in determining if output goals and objectives have been fulfilled. A quality management plan directs the project team to adhere to specified processes in order to fulfill quality requirements. Because the project quality management plan is such an important element of the project life cycle, you must create an effective quality management plan. Here's a stepby-step approach to helping you write your plan: Niluksha Dulmina MSCP Assignment 01 Time management plan: It is preferable to arrive three hours early rather than one minute late. You've probably heard the popular proverb about the value of time. Punctuality is a skill that not everyone possesses. However, time is the most crucial factor of any project for project managers. Time management is one of the ten knowledge areas in which a project manager must excel in order to obtain the Project Management Professional (PMP) certification. Poor time management skills lead to late project delivery, which not only casts doubt on your abilities but also negatively affects your company's reputation. As you prepare the initial plans for your project, a time management plan is important. It gives you specific instructions on how much time you should spend on certain project activity. A suitable timeline and program help guarantee that you stay on track. Risk management plan : Every day, a project manager must accomplish hundreds of obligations till the project is done. Communication is one such obligation. Effective communication keeps your team on the same page throughout the project. It also assures openness and the proper separation of tasks. Every seasoned project manager understands that without a project communication management strategy, it is impossible to assure that the project is on track. A communication management strategy assists in the identification of communication networks, people, and information flow. The team is continually in contact with stakeholders and consumers thanks to a communication management plan. It enables stakeholders and consumers to submit input, allowing the team to make necessary adjustments in a timely way and boost project efficiency. Resources management plan : A project resource management strategy is an essential component of every project plan. It identifies the availability and utilization of resources. It gives guidance for using resources in a cost-effective and efficient manner. A strong project resource management strategy guarantees that all necessary resources are accessible in enough numbers, ensuring the project's safety. Labor, materials, and equipment are all examples of project resources. A project resource Niluksha Dulmina MSCP Assignment 01 management plan serves as a thorough guide at the appropriate moment to include and maximize each of these available resources. It lowers project risk. You must first create an effective project resource management strategy before you can implement it. Delimitation: This research is only focused on one Sri Lanka Telecom company due to time restrictions and accessibility. Since various nations have varied levels of lockdown, with Sri Lanka on the more lenient end of the lockdown and related suggestions, this will constrain the conclusions of the thesis. In order to make the research about remote work during the COVID-19 situation, when the solutions would presumably be less serious, more applicable to the broader public, news items were picked. 1.2.1 Work breakdown structure Vulnerabilities Research Project 1. Initiation 2. Planning 3. Executing 4. Closure 1.1 Define Processes 2.1 Project Planning development 3.1 Brainstorming Vulnerabilities 4.1 Project Analyze 2.3 Work breakdown Structure 2.4 Gantt chart 3.2 Solicitation 3.3 Vulnerabilities Research tool development 4.2 Project reports 1.2 Analyze Requirement 1.4 1.3 Project charter charter Project approval development Niluksha Dulmina MSCP Assignment 01 1.2.2 Project summary Project Summery Project name Prepared by Managing a Project on Ananda Samarakoon cyber security risks due to Remote working Project date 07/08/2022 To 08/10/2022 1.2.3 Project overview Project overview Tasks action list Start date End date 07/08/2022 09/08/2022 Initiation 09/08/2022 12/08/2022 Define process for gathering requirement Niluksha Dulmina MSCP Done Not done Assignment 01 12/08/2022 15/08/2022 Analyze requirements 15/08/2022 18/08/2022 Project development 18/08/2022 22/08/2022 Planning 22/08/2022 25/08/2022 Project plan development 25/08/2022 27/08/2022 wbs 27/08/2022 30/08/2022 Gannt chart 30/08/2022 03/09/2022 Execution 03/09/2022 06/09/2022 Brainstorming 06/09/2022 10/09/2022 solicitation 10/09/2022 17/09/2022 Vulnerabilities research tool 17/09/2022 25/09/2022 closure 25/09/2022 30/09/2022 Project analysis 30/09/2022 05/10/2022 Project report end Niluksha Dulmina MSCP Assignment 01 1.2.4 Gantt chart Niluksha Dulmina MSCP Assignment 01 2 TASK Carry out research to investigate the cyber security risks of remote working by applying appropriate qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and the appropriateness of the research methods applied. your answer also should include a critical evaluation of the project management process and a justification to the selected research methodologies. Niluksha Dulmina MSCP Assignment 01 2.1 Project execution phase Methods used for information gathering, data collection and material resourcing Information may be gathered from a variety of sources. Most critically, there are no optimum data gathering methods. In general, the method used to gather data is determined by the nature of the researcher's research or the phenomenon being examined. Data gathering is an essential component of every degree of research effort. If the data is obtained incorrectly, it will undoubtedly alter the study's conclusions, leading to erroneous or valuable results. What is data collection? Before we establish data gathering, we must first define data. The short answer is that data is any type of information that has been structured in a specific way. As a result, data collecting is defined as the act of obtaining, measuring, and analyzing correct data from a number of relevant sources in order to identify solutions to study issues, answer questions, evaluate results, and anticipate trends and probability. Our civilization is heavily reliant on data, emphasizing the significance of data collection. To make educated business decisions, assure quality assurance, and maintain research integrity, accurate data collecting is required. During data collecting, researchers must identify data categories, data sources, and data collection techniques. We will quickly discover that there are several data collection methods. Data collecting is heavily used in the scientific, commercial, and government sectors. Why Do We Need Data Collection? Before a judge rules in a court of law or a general plan an attack, they must have as much pertinent data as possible. Informed judgments result in the best courses of action, and information and data are interchangeable. Niluksha Dulmina MSCP Assignment 01 As we'll see later, the principle of data collecting isn't new, but the world has evolved. Today, there is significantly more data available, and it exists in formats unheard of a century ago. To stay up with technology, the data gathering method has had to evolve and develop. Whether you're in academia attempting to do research or the commercial sector trying to sell a new product, you need data collecting to assist you make better decisions. Methods of data collection The system of data collection is based on the type of study being conducted. Depending on the researcher’s research plan and design, there are several ways data can be collected. The most commonly used methods are published literature sources, surveys (email and mail), interviews (telephone, face-to-face or focus group), observations, documents and records, and experiments. Literature sources This entails gathering data from previously published content in the public domain. Textbooks, government or private company reports, newspapers, journals, internet published papers and articles are all examples of literature sources. This type of data collecting is known as secondary data collection. Compared to primary data gathering, is less costly and takes less time. Surveys A survey is another means of acquiring information for research purposes. Information is obtained using questionnaires, which are typically based on individual or group experiences with a particular occurrence. This data can be gathered in a variety of ways. The most noteworthy methods are webbased questionnaires and paper-based questionnaires (printed form). The outcomes of this kind of data collecting are often simple to analyze. Niluksha Dulmina MSCP Assignment 01 Interviews The interview is a qualitative data gathering approach whose outcomes are based on intense involvement with respondents concerning specific research. Interviews are typically used to get detailed replies from the experts being interviewed. Structured (formal), semi-structured, or unstructured interviews are all possible (informal). In essence, an interview technique of data collection can be undertaken in person with the interviewee(s) or over the phone. Observations The observation technique of acquiring information is employed by seeing individuals in a certain circumstance or place at a specific time and day. Essentially, researchers examine the behavior of the individuals or situations being investigated. This style of research can be controlled, natural, or participant driven. Controlled observation occurs when a researcher follows a set protocol for studying persons or the surroundings. Natural observation occurs when people are observed in their natural environment. Participant observation is a technique in which the researcher becomes a member of the group being researched. Documents and records This is the practice of evaluating an organization's existing papers and records in order to trace changes over time. Records can be tracked by reviewing phone logs, email logs, databases, meeting minutes, staff reports, information logs, and so on. For example, a company may want to know why there are so many unfavorable reviews and complaints about its products or services. In this situation, the organization will examine product or service data as well as employee-customer interactions. Niluksha Dulmina MSCP Assignment 01 Experiments Experimental research is a research approach that examines the causal link between two variables. One variable can be changed, while the other is measured. These two variables are referred to as dependent and independent variables, respectively. Data in experimental research is often gathered based on the cause and effect of the two variables being researched. This form of research is prevalent among medical researchers and employs a quantitative research methodology. If you are interested in my services, please send me a note with your requirements. I will respond as soon as feasible. 2.1.1 Qualitative vs quantitative research The nature of the targeted outcome is one of the variables that distinguishes qualitative from quantitative investigations. Qualitative researchers aim to learn from the specifics of the testimony of persons they are investigating, often known as their informants. During the course of a research, conclusions are produced by accumulating, comparing, and assessing the informants' comments and contribution. The "why" behind a phenomena, correlation, or behavior is typically the subject of qualitative study. In contrast, quantitative data is quantitatively examined to generate a statistical picture of a trend or link. Such statistical findings may provide insight on cause-and-effect linkages. They may either validate or refute the study's initial hypothesis. The consequence, whether great or unpleasant, can raise awareness and prompt action. Qualitative Research Non-numerical data is collected and interpreted using qualitative research methodologies. Some qualitative data sources are as follows: Interviews Focus groups Documents Niluksha Dulmina MSCP Assignment 01 Personal accounts or papers Cultural records Observation The researcher may conduct interviews or focus groups during a qualitative study to obtain data that is not available in current documentation or records. Interviews and focus groups can be unstructured or semi-structured to allow for various or unexpected responses. In an unstructured or semi-structured style, the researcher might ask openended questions and then follow the replies. The replies give a thorough view of each individual's knowledge, that are then compared with those of other research participants. Quantitative Research Quantitative investigations, on the other hand, necessitate various data gathering methodologies. Compiling numerical data to investigate causal links among variables is one of these strategies. Data gathering methods for this sort of study include: Experiments Questionnaires Surveys Database reports The procedures described above produce data that is suitable for numerical analysis. In this situation, questionnaires use a multiple-choice style to provide countable answers, such as yes or no, which may then be converted into quantifiable data. Qualitative vs. Quantitative Outcomes The nature of the targeted outcome is one of the variables that distinguishes qualitative from quantitative investigations. Qualitative researchers aim to learn from the specifics of the testimony of persons they are investigating, often known as their informants. Niluksha Dulmina MSCP Assignment 01 During the course of a research, conclusions are produced by accumulating, comparing, and assessing the informants' comments and contribution. The "why" behind a phenomena, correlation, or behavior is typically the subject of qualitative study. In contrast, quantitative data is quantitatively examined to generate a statistical picture of a trend or link. Such statistical findings may provide insight on cause-and-effect linkages. They may either validate or refute the study's initial hypothesis. The consequence, whether great or unpleasant, can raise awareness and prompt action. Qualitative Quantitative Conceptual Concerned with understanding human behavior from the information’s perspective Methodological Assumes a dynamic and negotiated reality Data are collected through participant observation and interviews Data are analyzed by themes from descriptions by informants Data are reported in the language of the informant Concerned with discovering facts about social phenomena Assumes a fixed and measurable reality Data are collected through measuring things Data are analyzed through numerical comparisons and statistical inferences Data are reported through statistical analyses 2.1.2 The cyber security risks of working from home Working from home can be beneficial for work-life balance, flexibility, and the elimination of a commute, but it also introduces a slew of cybersecurity issues. With employees relying on personal networks and occasionally their own devices, new online tools and services, and extra diversions, regulating security measures has become a nightmare for an IT staff. According to the Velocity Smart Technology Market Research Report 2021, 70% of remote employees reported IT issues during the pandemic. With home working Niluksha Dulmina MSCP Assignment 01 seems to be here to stay, even post-pandemic, it's critical to assess your security measures and ensure that everything is operational and secure. When the epidemic arrived and everyone started working from home, some of your workers may have begun utilizing their personal gadgets for work. Whether it's using mobile phones instead of a work phone, printers, tablets, or laptops, one of the biggest hazards is a lack of IT security infrastructure. Many employees will not consider verifying that their mobile devices are encrypted when logging into corporate accounts, accepting critical conversations from clients, or having voicemails in their inbox that contain vital data. Meanwhile, firms are battling to govern remote workers' usage of phones and other mobile devices, according to CISO's Benchmark Report 2020. Many employees use their own devices for two-factor authentication, and they may have mobile app versions of instant messaging applications like Teams and Zoom. Because of the blurring barriers between personal and professional life, sensitive information is more likely to fall into an unsecured environment. There is nothing your IT staff can do to shield you from this enormous issue. Indeed, 52% of respondents in CISCO's research stated that mobile devices pose a significant risk to cyber security. Another risk that remotes employees confront is the possibility of phishing emails being sent by attackers. These are frauds aimed to trick users into disclosing personal information or downloading a malicious file containing a keylogger. The perils of phishing should be a major priority at any time, but things are extremely dangerous during the coronavirus epidemic. According to a recent survey, there has been a 600% spike in reported phishing emails since the end of February, with many of them capitalizing on the pandemic's uncertainty. To mitigate this risk, all work should be done on a business laptop that is subject to remote access security rules. This should include, at a minimum, twofactor authentication, which reduces the possibility of a thief getting access to an employee's account. malware and illegal logins are examples of harmful behavior. This guarantees that the appropriate tools, like as anti-malware software and up-todate programs, are in place to guard against any hazards. Niluksha Dulmina MSCP Assignment 01 It also provides your IT staff with control over the organization's IT infrastructure and lets them to monitor any dangerous behavior, such as malware and illegal logins. There are some overall examples for SLT Mobitel company face in that situation according to Network engineer of SLT Mobitel “ Mr. Ananda’s ” view: 1. Control the risk: To mitigate the dangers, each firm with employees who work from home must develop a remote working policy. It contains guidelines for securely keeping devices, setting and maintaining strong passwords, and an acceptable use policy for viewing non-work-related websites. Organizations should also explain the technology solutions they've put in place to secure sensitive data, as well as how workers may follow suit. We recommend, for example, using two-factor authentication with any third-party service you use. Although it should not be an issue during the lockdown, your remote working policy should cover the hazards associated with employees handling sensitive information in public settings. When business resumes, employees may utilize corporate devices in locations like trains and cafés, where opportunistic cyber thieves might lurk without attracting attention to themselves. Even in the absence of a hostile actor, security issues are just as likely to occur. Consider how frequently you hear about employees misplacing their laptop, USB flash drive, or documentation. 2. Unsecure home network connection: Unsecured personal networks are one of the primary causes of an increase in cyber security concerns when working from home. Employees may remember to update their devices and antivirus software, but home router software upgrades are frequently ignored. Personal routers that are not frequently updated are vulnerable to security flaws that might lead to data leaks. Furthermore, firewalls will be installed on enterprise networks to monitor traffic and stop any unwanted activities. Many home routers do not have a firewall, which can lead to network security holes. Niluksha Dulmina MSCP Assignment 01 3. More use of online tools: Businesses are increasingly more vulnerable to cyber dangers as they rely more on technology and internet tools. From cloud storage to emails, attachments, instant messengers, third-party services and platforms like Teams, Zoom, Hangouts, and Asana, more and more work are being accomplished online. This certainly provides additional opportunities for fraudsters to get access to company accounts. 4. Employees can’t spot scams: Unfortunately, one of the most prevalent security dangers of working from home comes from workers. Employees might accidentally provide hackers access to their devices or corporate files due to carelessness, exhaustion, or a lack of expertise. In fact, according to a Society of Human Resource Management survey, 35% of employees reported feeling fatigued or having little energy while working from home. Workers are usually far too distracted with their day-to-day responsibilities to evaluate cyber security issues, especially if they haven't been educated to do so. Cybercriminals are always evolving and upgrading methods to defraud individuals and steal data, therefore it should come as no surprise that employees will occasionally fall for these deceptions. The quantity of frauds and phishing emails has expanded significantly throughout the epidemic, making employee ignorance one of the most serious security threats when working from home. 5. Staff lose sight of security concerns: Even if your organization has taken the time to educate employees on cyber security threats, it is possible that they will lose sight of or forget about these concerns when working from home. With the hectic dayto-day, IT security might slide down people's priority lists, and employees are more likely to be slack about security standards if supervisors are not there to supervise their behavior. Furthermore, because to the length of the epidemic and its economic consequences, some employees may be concerned about their employment prospects or financial situation. According to studies, many workers were planning for the worstcase situation, in which they lost their job, or their firm went bankrupt. In fact, according to a Deloitte poll, 26% of respondents were tempted to create duplicates of Niluksha Dulmina MSCP Assignment 01 essential firm data as a precaution. Storing internal company data against a worst-case scenario highlight how critical it is for businesses to act to prevent the loss of corporate data, intellectual property, and, more broadly, to combat the danger of corporate fraud. 6. Weak passwords: Even if your firm uses VPNs, firewalls, and security tools, your organization may still be vulnerable if employees use weak passwords on their accounts. Rather than attempting to breach robust security architecture, fraudsters will initially attempt to crack accounts with weak passwords. To do this, they employ a variety of technologies, including password generators and coding bots, to continually attempt to guess passwords and check accounts for duplicate passwords. 7. Phishing and ransomware: Phishing and ransomware assaults are another huge hazard to remote employees. Cybercriminals use these scams to trick victims into giving personal information or putting dangerous software onto their devices. This type of hazard should already be on employees' radar, but the incidence of such attacks has increased dramatically during the epidemic. Phishing emails have increased by almost 600% since the end of February, according to a database, as cyber-criminals seek to capitalize on the fear and uncertainty caused by the COVID-19 outbreak. They operate by a criminal impersonating a respectable source, generally via email, in order to deceive the victim into revealing login information or sensitive information. The perpetrator will then take or lock this information and demand a ransom. 8. Unencrypted file sharing: While businesses may consider encrypting files maintained on their network, they may overlook file encryption when data is transferred from one location to another. Your organization cannot afford for thieves to intercept files as they are transmitted, from client account information to consumer data and financial information. When files are taken in this manner, identity theft, ransomware, and theft might occur. Niluksha Dulmina MSCP Assignment 01 9. Personal devices: When the epidemic arrived and everyone started working from home, some of your workers may have begun utilizing their personal gadgets for work. Whether it's using mobile phones instead of a work phone, printers, tablets, or laptops, one of the biggest hazards is a lack of IT security infrastructure. Many employees will not consider verifying that their mobile devices are encrypted when logging into corporate accounts, accepting critical conversations from clients, or having voicemails in their inbox that contain vital data. 2.1.3 Field work Work from home at STL Mobitel Work from home (WFH) policy at SLT Mobitel: What do employees think about the WFH policy at SLT Mobitel? Explore insights about perks, benefits, and flexible hours. Niluksha Dulmina MSCP Assignment 01 Niluksha Dulmina MSCP Assignment 01 Work from home during COVID-19 at SLT Mobitel How was your experience working at SLT Mobitel during COVID-19? Learn about working from home owing to COVID-19, as well as employee leadership permissions. Niluksha Dulmina MSCP Assignment 01 Work from home support at SLT Mobitel Niluksha Dulmina MSCP Assignment 01 Does SLT Mobitel’s management encourage working from home? Investigate the advantages of working from home, as well as the necessary equipment and resources. Niluksha Dulmina MSCP Assignment 01 Work-life balance and flexibility at SLT Mobitel Does SLT Mobitel's management encourage professional development? Learn about flexibility, leaving during the day, and attending appointments. Niluksha Dulmina MSCP Assignment 01 Niluksha Dulmina MSCP Assignment 01 2.1.4 Remote Agile: Observations on productivity for less mature teams by SLT Mobitel The consequences of COVID-19 have pushed the adoption of entirely remote teams, a trend that is expected to persist long after the epidemic has passed. Employers all across the world have begun to embrace the approach, with businesses such as Atlassian, Facebook, and Twitter stating that staff would be able to work from home on a permanent basis. Many firms claim 44% gains in productivity. Co-located teams have historically been the emphasis of SLT network engineering. While many current SLT Networking teams already have some distributed processes, the epidemic has prompted the adoption of a completely distributed model. At this point, the ways to increasing remote labor productivity and team engagement are quite well recognized. This SLT Mobitel post discusses various actual insights as well as prospective techniques to tuning remote SLT team performance. One of the important conclusions has been that the productivity gains or losses from remote operations are painfully increased by the maturity of the SLT team, but many of these may be solved using strategies and tools. various insights about how distant operations affect SLT team maturity and productivity, particularly for less mature teams Many of the recommendations are aimed at closing the productivity gap for less established SLT teams. Niluksha Dulmina MSCP Assignment 01 Maturity factors impacting remote productivity Limited product knowledge shaped Broad product knowledge shaped resources narrow focus limited rust and resources Hight level rust and account visibility. ability. 2.1.5 Observation 1: Limited informal learning when working remote Network engineers learn a great deal from their peers through informal and sometimes unintentional interactions. For example: Watching more experienced physical contact problems can teach dos and don'ts. Poor Wi-Fi signals and Wi-Fi usage Informal discussions about cable choices, algorithms, and technical approaches are critical to building group knowledge. These basic troubleshooting steps may not reveal a problem because some applications perform complex calculations, receive high-speed video, or interact with large databases. This can be difficult to replicate in a fully remote model. Less mature SLT teams suffer from a lack of informal learning with more narrowly focused expertise and relative levels of networking product knowledge. Approaches to improve maturity in this area: Water cooler interactions should be encouraged to use group chat and messaging facilities, especially for one-on-one discussions. Enable more opportunities for informal learning. For example, peer code reviews with online screenshots can help senior team mentor more junior resources. Documenting processes and best practices is critical to team productivity. At the very least, utilize a group chat or a forum to collect information in an unstructured manner. Niluksha Dulmina MSCP Assignment 01 Establish formal learning time for team members to ask questions Set aside formal learning time for team members to document solutions to queries from other teams. 2.1.6 Observation 2: Accountability and trust are hard when you can’t see each other One of the most difficult issues for completely remote teams is the loss of visibility and line of sight, which can lead to a lack of trust and accountability. This is exacerbated when team members have never worked together before. This can lead to a situation where significant time is spent micro-managing daily activities, creating reports, following up on activities and influencing team performance at a much finer level than the daily fixed level. Approaches to improve maturity in this area: Clarify and validate definition done across the team Ensure work items are tracked against definition done in a single source. Use that single source for all work progress discussions to avoid low-value status checking and reporting activities. Concentrate the team on outcomes. When reporting results, they should be coded. Use tools to connect the team's output and contributions, as well as to assure access and exposure to the tools. 2.1.7 Observation 3: Team chat and instant messaging are great, but they can cause implicit bottlenecks Group chat and instant messaging are critical tools for remote teams. However, for less mature teams, group chats can create implicit barriers. Group chat channels can fill up quickly with questions and requests, hindering more experienced team members trying to respond, and in turn, making it unclear whether requesters are getting some of their questions answered. Niluksha Dulmina MSCP Assignment 01 Potential approaches: Establish time slots for specialists to answer questions from the rest of the team. Inform individuals and groups that their demands must be priority. A call is faster than waiting for a response on the team channel for urgent matters. Set up retreats or bring in outside specialists to assist less experienced team members. Set up a mechanism in which every request in group conversations is assigned an urgency level. 2.1.8 Observation 4: Non-work interactions can help the team member engage Mature teams often have a strong feeling of personal connection, which helps to promote team identity, engagement, and cooperation. This might be tough to develop in a less mature remote team. While there is a plethora of research on the value of nonwork contacts, getting team members to communicate dynamically outside of work can be difficult. Instead, then seeing social time as an extension of work, the aim is to make it engage, lively, and pleasurable for participants. Some ideas that have had generally good results: Divide your social time into reasonable portions. For example, in the last five minutes of each stand-up, have a team member (appropriately chosen) speak about a topic of interest to them. A group exercise can be used to cover predetermined themes. Creating a non-working channel in which team members may post about themselves while they are not working. Niluksha Dulmina MSCP Assignment 01 Video and face-to-face engagement can help team members connect more effectively. However, be conscious of how it affects your professional and personal life. Agile teams must be cognizant of the performance consequences of distant activities. While increasing the team's quick maturity should be a goal, there are numerous approaches to decrease the productivity loss associated with remote operations for less mature teams. These ideas are applicable to all broad tactics for improving the performance of a remote workforce. 2.1.9 Key findings The table below summarizes major results, practical and social ramifications, and pertinent recommendations from experienced businesses. This will provide a summary of the results. Key findings Impacts Increased opportunities for remote work in the future (1-4 days per week) Keep the good and eliminate the majority of the bad. Poor ergonomics Can be harmful to one's physical health Separation of work and leisure is difficult for some people Can be harmful to one's social life and mental health Niluksha Dulmina Previous Advice from experienced companies Needs to be further Many firms now researched after crisis provide remote employment, either part-time or fulltime, and this trend is expected to continue. Adds to previous Invest in what you require. Employees research benefit from having the correct workplace. Partially Agrees with Allow for flexible working hours. previous research Don't establish regular habits that encourage frequent celebrations, rest, and physical exercise. MSCP Assignment 01 Positive mental health impacts Positive environmental impact. More time for work or play There is less time for staff bonding. Work that is more efficient Agrees with previous research Increased loneliness and isolation Can be harmful to one's mental health. Organizational loss of "team-feeling" and cohesiveness Agrees with previous research Loss of body language Communication misunderstandings Agrees with previous research Less but more efficient communication. Increased productivity More time for other pursuits. Socialization loss Organizational Benefits Agrees with previous research Less commuting Fewer casual interactions Agrees with previous research Encourage workers to communicate casually and outside of work. Encourage workers to communicate casually and outside of work. Virtually recreate the breakroom. Incorporate video into meetings and chats to help recover some of the missing body language. Communicate clearly and frequently. Agrees with previous research 2.1.10 Questions to Assistant Managers What industry does your business operate in? How many staff do you manage? How many of these employees work remotely? Have you previously managed remote employees? Have you used any remote work resources (handbooks, advice, etc.)? Remote work with Leadership How did you come up with the manner work would be governed? Bottom-up or topdown? Niluksha Dulmina MSCP Assignment 01 Have you discussed the adjustment with your staff both before and after they began working remotely? What were the expectations before, and how did they turn out? How do you assess the effectiveness of remote workers? Is it different from how they measure at work? How do you compare work performance between office work and remote employment? What are your thoughts on working overtime or overworking? Have you seen any workers suffering with the separation of work and home life? Do you strive to assist your staff separate work and home life? If so, how do you ensure that your workers separate work and family life when they work remotely? What steps have you taken to ensure that your staff have the tools they need to execute their jobs? Do you make certain that they work in a separate location that is as ergonomic as possible, or do you allow them to select where they work? To what extent do you monitor your employees? How has trust between you and your staff evolved? How do you interact with your employees? How often? What is the difference in meetings between working in the office and working remotely? How do you deal with offering feedback when leading remotely? How does it vary from the "normal" method of providing feedback? What are your thoughts/policies on non-work conversations? (In general, and during meetings) What have you done to encourage colleague socialization? Group gatherings, for example, or "water cooler" conversations How important is it to you that all employees be seen and heard? In How do you ensure that individuals feel heard and included? How can you ensure your employees' emotional and physical health? How do your employees seek assistance when it is required? What about the difference in needing assistance while working remotely versus working in an office? Are the "issues" the same, or do you believe they have separate issues? How has sick leave and absence evolved since working from home? About Opportunities and challenges Question Niluksha Dulmina MSCP Assignment 01 What chances have you observed given the situation with COVID-19 and remote work? What challenges do you have while using remote leadership? What aspect of leadership do you find the most difficult while leading remotely? What is "new" about leading remotely versus leading in an office? How will this condition affect your working style in the long run following Covid-19? 2.1.11 Questions to SLT Company Workers What are your duties in the organization, and what are you doing/working on? Have you ever worked remotely before? Is your boss used to handling remote workers? Have you utilized any handbooks, recommendations, or other resources to help you transition to remote work? Remote working Where do you do your work? What have you done to enhance the ergonomics of your workspace? What tools/resources has your management offered for you to build an ergonomic workspace? What are your daily routines, and how have they altered since you worked at the office? How do you communicate with your coworkers? Do you believe it is possible to socialize virtually as you would normally? How do you manage your physical and emotional health? Does your boss check in on you for causes other than work, and if so, how and how often? How essential are fitness and good air quality to you? Do you believe you are being heard by management? Niluksha Dulmina MSCP Assignment 01 What communication channels are employed to remain in touch with colleagues and leaders? What works well with the channels and what would you change? What do you miss the most about working remotely instead being in an office? How would you rate your personal productivity when working remotely versus in the office Is it the same amount of time to do a task remotely as it is in the office? How will this circumstance affect your working style (in the long run) after covid-19? (Problems and opportunities) What challenges do you have while working remotely vs in an office? What advantages do you obtain from the current scenario of working remotely as a result of COVID-19? How has your need for feedback and assistance evolved when working remotely versus in the office? How do you keep business and personal life distinct when working remotely? Is your management in charge of setting your working hours, or can you change them to fit your best times? Do you find it difficult to combine your professional and personal lives? Is there anything you cannot accomplish remotely? What type of duties are they? (Something that demands you to be at the workplace) Do you have trouble focusing when working remotely? What do you do to focus? Which component of working remotely do you find the most difficult? Niluksha Dulmina MSCP Assignment 01 3 TASK 3.1 Analyze research data collected to support your research project using appropriate tools, techniques and critically evaluate how selected tools, techniques uphold authenticity and the accuracy of the data collected. 3.1.1 What Is Data Analysis? Although many diverse individuals, companies, and professionals approach data analysis in different ways, the majority of them may be reduced into a one-size-fitsall description. Data analysis is the process of cleansing, manipulating, and analyzing raw data in order to obtain usable, relevant information to aid in making educated business choices. The technique reduces the inherent risks in decision making by offering beneficial insights and data, which are frequently displayed as charts, figures, tables, and graphs. A basic example of data analysis is when we make a choice in our everyday lives to examine what has happened in the past or what would happen if we made that decision. Essentially, this is assessing the past or the future and making a choice based on that understanding. The term "big data" is frequently used in data analytics talks. Data analysis is critical in transforming huge data into valuable knowledge. "What exactly is data?" Let us return to the core question for neophyte data analysts who wish to go further by examining big data fundamentals. 3.1.2 Why is Data Analysis Important? Better consumer targeting: You don't want to waste your company's important time, energy, and money creating advertising campaigns for demographic groups who aren't interested in the items and services you provide. Data analysis can assist you choose where to focus your advertising efforts. You Will Know Your Target Customers Better: Data analysis measures how effectively your items and promotions perform among your target population. Data analysis may help your company gain a deeper understanding of your target audience's buying patterns, disposable money, and areas of frequent interest. This Niluksha Dulmina MSCP Assignment 01 information assists firms in setting prices, determining the length of advertising campaigns, and even projecting the volume of product required. Reduce Operational Costs: Data analysis will show you which sections of your organization demand more resources and money, and which should be trimmed back or deleted totally. Better Problem-Solving Methods: Decisions that are well-informed are more likely to be effective. Businesses are informed by data. You can see where this development is going. Data analysis assists organizations in making sound decisions and avoiding costly blunders. You Get More Accurate Data: You need data to make educated judgments, but there's more to it. The essential information must be correct. Data analysis assists firms in obtaining the required information for future marketing strategies, business planning, and revamping the company's vision or goal. 3.1.3 Data Analysis about SLT-Mobitel SLT-Mobitel, as part of the Digital Partnership Program, has entered into a strategic collaboration with Softlogic IT to introduce data exchange and analytics services. This enables businesses to adopt an essentially data-driven approach to solving problems and gaining deeper insights into data using IZAC's 'Data Exchange and Analytics Platform' and MicroStrategy’s tools and processes. IZAC is the Global Data Exchange platform by Whiteclay and MicroStrategy is the largest publicly traded independent analytics and business intelligence company. A strong data management landscape helps an organization improve its bottom line by prioritizing its sales and operations efforts. Effective use of decision science has also led to greater clarity in the organization's messaging and strategy. The integrated solution will provide enterprises with a subscription-based intelligent data management service hosted on the SLT-Mobitel Akaza cloud platform. This solution enables enterprises to visualize data patterns and apply predictive analytics to make timely decisions and thereby make their business operations more efficient. Niluksha Dulmina MSCP Assignment 01 Sri Lanka Telecom CEO Janaka Abeysinghe said, “SLT-Mobitel recognizes that data is the new 'source of truth' for enterprise customers when it comes to achieving sustainable growth and fostering innovation. By partnering with SLT in its journey to transcend connectivity, cloud and data, we plan to take Sri Lankan organizations to the next level of decision-making using Data Virtualization, Analytics and AI tools on the Whiteclay platform. Enterprise Digital Transformation" Mr. Ananda Samarakoon, CEO, Whiteclay (Pte) Ltd said, “The true value of data science is realized when you have a good data engineering stack. In today's world, the lack of a strong data background should not hinder any organization from gaining quick insights from data. “If a trend line can be identified in the data, analysts should be able to ask the system 'what changed', giving them the flexibility to slice and dice data at a real-time level and generate a dashboard. their will. If they don't need the dashboard after a few days, they can discard or edit it. But the point is, deploying such systems in any organization's environment requires a lot of effort from the technology, strategy and finance teams. 3.1.4 Data Analysis Tools Best Data Collection Tools for Interviews For collecting data through interviews, here are a few tools you can use to easily collect data. Digital Camera: A digital camera has the advantage of being able to transfer photos to a display screen when necessary. Audio Recorder: An audio recorder is a device that records sound onto a disc, tape, or film. Audio information may suit a wide range of people's demands while also providing alternatives to print data collecting technologies. Camcorder: A camcorder is used to record data from interviews. It functions as both an audio recorder and a video camera. The data presented is qualitative in nature, allowing responders to thoroughly address the questions posed. Best Data Collection Tools for Reporting Niluksha Dulmina MSCP Assignment 01 Reporting tools allow you to extract and present data in charts, tables, and other visuals so that users can discover relevant information. Non-Governmental Organization (NGO) reports, newspapers, internet articles, and medical records might all be used to gather data for reporting. NGO Reports: NGO reports provide an in-depth and comprehensive report on the NGO's operations, which encompass subjects such as business and human rights. The content in these papers is research-specific and serves as an appropriate academic foundation for data collection. NGOs frequently focus on development initiatives that are established to promote certain causes. Newspapers: Newspaper data is relatively easy to obtain and is frequently the only continuous source of event data available. Even if there is a bias problem with newspaper data, it is nevertheless a legitimate instrument for data collection for reporting. Website Articles: Another data collecting method is gathering and utilizing data included in website content. Data collecting from online articles is a faster and less expensive method of data collection. The biases inherent in the data gathering procedure, as well as potential security/confidentiality problems, are two main downsides of employing this data reporting approach. Data Collection Tools for Observation Observation involves the active acquisition of information from a primary source. Observation can also involve the perception and recording of data via the use of scientific instruments. The best tools for Observation are, Checklists: Users can acquire information and make judgements about what they should know based on state-specific criteria. They provide systematic methods for gathering data on certain behaviors, knowledge, and abilities. Niluksha Dulmina MSCP Assignment 01 Direct observation: This is an observational research approach for gathering evaluative data. The evaluator observes the subject in his or her typical setting without changing anything. Data Collection Tools for Focus Groups A focus group is a way of gathering information that is intensively guided and structured around a series of questions. The meeting's goal is to elicit thorough replies to these questions from the attendees. The most effective tools for dealing with focus groups are Two-Way: One group observes another group respond to the moderator's questions. After hearing what the other group has to say, the group that listens can foster additional conversation and perhaps reach different conclusions. Dueling-Moderator: Two moderators take on the role of the devil's advocate. The fundamental advantage of the dueling-moderator focus group is that it fosters fresh ideas by presenting different ways of thinking and varying points of view. 3.1.5 Types of Data Analysis Methods Niluksha Dulmina MSCP Assignment 01 There Are Some Of Them, 1. Cluster analysis: The process of arranging a set of data components in such a way that they are more comparable (in a certain sense) to those in other groups, thus the word "clustering." Because clustering has no goal variable, it is frequently used to uncover hidden patterns in data. Access is also used to offer context to a trend or data collection. Let's take a look at it from a business standpoint. In an ideal world, marketers would be able to assess each consumer individually and give them with the finest tailored service possible but doing so with a big customer base is not feasible. This is where clustering comes in. By categorizing clients based on demographics, shopping habits, monetary worth, or any other element important to your business, you will be able to quickly optimize your efforts and provide your customers with the greatest experience possible 2. Cohort analysis: This data analysis approach examines and compares a specific slice of user activity, which may then be grouped with others with comparable characteristics. This approach can provide a wealth of insight into consumer demands or a solid grasp of a larger target population. Cohort analysis may be quite valuable in marketing analysis since it allows you to assess the impact of your ads on certain groups of clients. Consider sending an email campaign enticing customers to sign up for your website. Create two variations of the campaign, each with a distinct design, CTA, and ad text. Later on, you may use cohort analysis to analyze the campaign's success over time and determine which types of content are causing your consumers to join up, repurchase, or interact in other ways. 3. Regression analysis: Regression analyzes historical data to determine how one (linear regression) or more independent variables (multiple regression) impact the value of a dependent variable. Understanding the link between each variable and how it evolved in the past allows you to predict alternative outcomes and make better Niluksha Dulmina MSCP Assignment 01 decisions in the future. Let us illustrate with an example. Assume you conducted a regression study of your 2019 sales and determined that variables such as product quality, shop design, customer service, marketing efforts, and sales channels all had an impact on the total result. You'd want to utilize regression to see which of these variables changed or whether any new ones arose in 2020. For example, owing to COVID lockdowns, you might not be able to sell as much in your physical store. As a result, your sales might have decreased overall or grown through your online platforms. You may then determine which independent factors influenced the overall performance of your dependent variable, yearly sales. 4. Neural networks: The neural network serves as the foundation for machine learning's clever algorithms. It is a type of analytics that aims to understand how the human brain generates insights and predicts values with minimum involvement. Neural networks learn from every data transaction, which means they develop and progress over time. Predictive analytics is a common use for neural networks. There are BI reporting solutions that have this feature built in, such as data pine’s Predictive Analytics Tool. Users may use this tool to rapidly and conveniently produce many types of forecasts. Simply pick the data to be processed depending on your KPIs, and the program will automatically produce estimates based on historical and current data. Anyone in your business may administer it because to its user-friendly interface; no sophisticated scientist is required. 5. Factor analysis: Factor analysis, commonly known as "dimension reduction," is a method of data analysis that describes variability among seen, associated variables in terms of a possibly smaller number of unobserved variables known as factors. The goal here is to find independent latent variables, which are good for simplifying certain parts. A customer review of a product is an excellent approach to grasp this data analysis process. The initial evaluation is based on several characteristics such as color, form, Niluksha Dulmina MSCP Assignment 01 wearability, current trends, materials, comfort, where they purchased the goods, and frequency of usage. Depending on what you want to track, the list might be limitless. Factor analysis enters the picture in this situation by summing all of these variables into homogeneous groupings, for as grouping the variables color, materials, quality, and trends into a new latent variable of design. 6. Data mining: A data analysis strategy that encompasses engineering metrics and insights for added value, direction, and context. Data mining uses exploratory statistical assessment to find relationships, linkages, patterns, and trends in order to develop enhanced knowledge. Adopting a data mining approach is critical to success when evaluating how to analyze data; as such, it is a subject worth examining more. Data pine intelligent data alerts are a good application case for data mining. They deliver automatic signals based on certain instructions or occurrences within a dataset using artificial intelligence and machine learning. If you're tracking supply chain KPIs, for example, you might configure an intelligent alarm to go off when incorrect or low-quality data surfaces. This allows you to go deep into the problem and resolve it quickly and efficiently. 3.1.6 Data Analysis consists of the following phases: Data Requirement Gathering Data Collection Data Cleaning Data Analysis Data Interpretation Data Visualization 1. Data Requirement Gathering: First and foremost, consider why you want to do this data analysis. All you need to do is figure out why you're performing data Niluksha Dulmina MSCP Assignment 01 analysis. You had to determine what kind of data analysis you wanted to perform! In this step, you must select what to analyze and how to assess it, as well as why you are researching and what methods you will use to do this analysis 2. Data Collection: Following requirement collection, you will have a clear notion of what you need to measure and what your results should be. It is now time to gather data depending on the criteria. Remember that once you've acquired your data, it must be processed or structured for analysis. You must keep a journal containing the collection date and source of the data as you gather data from multiple sources. 3. Data Cleaning: Now, whatever data is obtained may be useless or unrelated to your analysis goal, thus it must be cleansed. The obtained data may contain duplicate records, white spaces, or mistakes. The information should be tidy and error-free. This step must be completed before Analysis since the results of Analysis will be closer to what you intended. 4. Data Analysis: The data is ready for analysis once it has been gathered, cleansed, and processed. As you alter data, you may discover that you have all of the information you require, or that you need to acquire more. You can utilize data analysis tools and software during this phase to assist you comprehend, analyze, and draw conclusions based on the requirements. 5. Data Interpretation: After you've analyzed your data, it's time to interpret your findings. You may describe or explain your data analysis in a variety of ways, including in words, a table, or a graphic. Then, based on the outcomes of your data analysis, determine the best line of action. Niluksha Dulmina MSCP Assignment 01 6. Data Visualization: Data visualization is quite ubiquitous in everyday life; it is frequently seen in the form of charts and graphs. In other words, facts presented visually to make it easier for the human brain to absorb and digest. Data visualization is frequently used to reveal previously undiscovered facts and patterns. You can discover useful knowledge by detecting relationships and comparing datasets. 3.2 Interpretation 3.2.1 Are developers who work remotely more satisfied with the job? Very Desapointed Slightly Disapointed Slightly Satisfide Very Satisfide 40 35,535,5 Neither satisfied or disapointed 34 35 30,8 30 27 27 25 20 13 15 10 19 17 12 11 7,8 17,5 8,5 7,5 5 0 Full-Time Remote Niluksha Dulmina Partialy Remort Flexibility Of Work MSCP Not Remote Assignment 01 3.2.2 Do remote employees make more money? With wage cuts implemented in most regions of the world as a result of the worldwide pandemic, it is critical to understand earnings before making any decisions. Let us compare the salary rates of remote developers to those of the others. Average Annual Salary 26% Full Time Remote 34% Partially Remote Flexibility Of work Not Remove 40% Niluksha Dulmina MSCP Assignment 01 3.2.3 What are the most common challenges faced when working remotely? Challangers Time Spend Comunting Toxic work environment Lack of support from management Not enough people for the… Non development works Non work comitment Distract work environment Meetings 0 10 20 30 Meetings Distract work environment Non work comitment Non development works Not enough people for the worklode Lack of support from management Toxic work environment Time Spend Comunting 40 Meetings, a distracting work environment, and non-work responsibilities are the three most typical obstacles encountered when working remotely. Non-work obligations include caring for children and doing housework. Niluksha Dulmina MSCP Assignment 01 3.2.4 In what type of organizations are remote work popular? Percentage of all remote work 30 25 20 15 10 5 0 Freelancer 2.9 10-19 20-99 100-499 500-999 1000-9999 employees employees employees employees employees employees 10000 or more employees Percentage of all remote work Smaller firms have a strong culture of remote working. A noteworthy proportion (read 70%) of remote workers operate in firms with less than 100 employees. So, if you want to work remotely, your best chance is to join a tiny organization or build your own! 3.2.5 Fundamental Types of Interviews in Research A researcher must conduct interviews with a group of participants when information can only be gathered by meeting and personally engaging with a segment of their target audience. Interviews provide a venue for researchers to prompt their subjects and get information in the appropriate detail. Niluksha Dulmina MSCP Assignment 01 3.2.6 Structured Interviews Structured interviews are research techniques that are exceedingly rigorous in their operations and give very little or no opportunity for pushing participants to collect and assess data. As a result, it is also known as a standardized interview, and its methodology is heavily quantitative. The questions in this interview are redecided based on the level of detail requested. Advantages of structured interviews Structured interviews are particularly planned since they focus on the correctness of diverse replies. Data can be gathered. Different respondents provide different types of replies to the same structure of questions; the results can be examined together. They can be used to contact a huge portion of the target demographic. The standardization provided by structured interviews simplifies the interview process. The same interview structure makes replication across different samples simple. Because the breadth of detail is already addressed while organizing the interview, better information can be gathered, and the researcher may conduct a thorough analysis of the research topic by asking accurate research questions. Because the framework of the interview is established, it frequently produces solid findings and is easy to implement. Because the researcher's interaction with the respondent is informal, the researcher can easily comprehend the margin of error if the respondent declines to participate in the survey or is just uninterested in delivering accurate information. 3.2.7 Personal Interviews Personal interviews, in which questions are asked directly to the respondent, are the most common form of interviewing. A researcher can use an online survey guide to record responses. A researcher can tailor his or her survey to capture the interviewee's main thoughts or ideas. Niluksha Dulmina MSCP Assignment 01 Advantage: There is a means to alter questions when interviewers and responders are face-to-face if this is not understood. If there is uncertainty on both sides or particular information is provided, more thorough responses are accessible. While asking questions and taking notes, the researcher has the chance to notice and evaluate the interviewee's body language. A high rate of reaction. 3.2.8 Telephonic Interviews Because of the logistics and time savings, telephone interviews are quickly replacing traditional "on-site" interviews. It is now more convenient for candidates to have a phone chat than go to a faraway place. Although the fact that the individual does not have to be physically present during the interview is a clear advantage, it may also be one of its distinguishing downsides. Tips to Clear a Telephonic Interview Speak clearly and loudly enough to be heard. Allow the interviewer to do the most of the talking while presenting the directions so you comprehend. Speaking at random might also irritate the listener. Speak with a grin. Smiling when speaking affects the curve of your mouth as you say the words, and the listener can immediately detect this tone shift. Carry a notepad, a pen, and a copy of your CV with you to write down vital information. Advantages: Having their phone is sufficient to find the interviewers Hand no. They are frequently inexpensive. Information is gathered fast. Personal contact can also help to clarify misconceptions or offer further information on questions. Niluksha Dulmina MSCP Assignment 01 3.2.9 Email or Web Page Interviews Individual researchers should adapt to this transformation as online research evolves as consumers migrate into a more virtual environment. Interviews done via email or web pages have grown amazingly popular among the most commonly utilized interviews nowadays as the number of individuals with internet access has increased. Nothing beats an online survey for this. As more people purchase online, it is an excellent location to conduct an interview that provides information to help them make the best selections. Advantages of email surveys: Data acquisition rate Respondents react at their leisure, when and when they want. Online surveys can be used with other research methodologies or used in conjunction with a variety of pre-interview arrangements. They are the tools that will allow you to complete and pay for the project flawlessly. A researcher may quickly generate a variety of questions, arguments, graphs, and reports. Niluksha Dulmina MSCP Assignment 01 4 TASK 4.1 Advantages of Assignments Assignments are provided to children in order to bridge the gap between what they learn at school and what they study at home. Assignments are expected to create the required papers that may be used for further research. To complete the assignment properly, the statement or question they attempt must be entirely comprehended. 4.1.1 Technical advantages of assignment writing: 1) Provides Awareness and Knowledge about Technical Topic Teachers give several topics to pupils in order for them to get technical expertise. Some things are beyond their theoretical comprehension. It also aids in widening their cognitive skill horizon. Students are introduced to informative insights and important concepts through homework. This is an excellent method to form an opinion on the subject. 2) Writing Skills Are Improved Assignments requiring you to produce an essay or a paragraph on a certain topic can help you develop your writing abilities. Because designing diverse projects sharpens students' abilities to write and express their thoughts. They will be able to communicate and explain better when they acquire a writing habit. 3) Analytical Abilities or Cognitive Abilities Are Also Enhanced Belittling the value of assignments won’t get us anywhere, as students are able to enhance and increase their imaginative and mental skills. Their rationality is also improved at the same time. Niluksha Dulmina MSCP Assignment 01 Assignments provide students the space to experiment and try out ideas and other innovative methods to deliver their subject in a unique way. 4) Research Traits Are Also Enhanced Students have the option to conduct research on their topic through assignments, which allows them to investigate various ideas and examples concerning their topic. Conducting research is a vital and enjoyable activity for the human brain to improve its knowledge base. The research that goes into creating an assignment enhances students' critical thinking and analytical abilities, as well as involves students in the university community and delivers benefits and advantages at the professional level. Gain a lot of experience out of research like: Time Management Because time management and other activities go hand in hand, it's one of the most sought-after talents that everyone should acquire. It would be challenging to coordinate your work if you lack time management skills. If you don't manage your time well, you won't get everything done, and you can even make bad judgments regarding your work schedule. Planning and Organizing Skill You learn to organize and prioritize your work, focusing on the most important tasks first. Organizing your work will allow you to finish it with peace of mind rather than going through the headache and turmoil, which will cause you to lose concentration and miss out on a lot of crucial topics to cover in your assignment when performing your research. 5) Application of Real-Life Examples Improves Learning Niluksha Dulmina MSCP Assignment 01 This characteristic should be taken into account because the assignments allow students to apply and link diverse real-life examples with their theme. This method allows pupils to absorb new levels of knowledge each time they engage in a new writing project. 4.2 How to face Cyber Security Risks SLT Mobitel company about “Ananda Samakoon” opinion The current context of a highly competitive and volatile business environment, market saturation of telecom operators, OTT players, rapidly changing technology and economic uncertainties are putting pressure on business operations. Therefore, it is imperative for an organization to proactively identify business-critical risks and manage them effectively. Considering the importance, the Board of Directors (BOD) has instructed to implement effective risk management processes across the organization. In accordance with the Board's instructions, SLT developed the Enterprise Risk Management (ERM) process and ERM framework. References have been made to ERM best practices such as ISO 31000 and COSO, and proper guidance in this regard has been obtained from Messrs. Deloitte. With the implementation of the ERM process, SLT has begun to identify and manage its operational risks in dayto-day business operations. Hence, a risk management culture is created in the organization. A formal process for reporting risks to the board was introduced to improve and drive the ERM process. To support this process, a Risk Management Steering Committee (RMSC) was established under the chairmanship of the Group CEO. This helped to analyze any acute risks from functional groups and identify key business-critical risks. Furthermore, the ERM process has been extended to our subsidiaries, including Mobitel, and the Board reviews group risks at the Audit Committee meeting. Risk management has now reached maturity in both functional units and project management and has become an important (BAU) process. It encourages senior executives to embed the risk management process into functional units. This empowered them to take properly calculated positive risks (risks with rewards) and to Niluksha Dulmina MSCP Assignment 01 accept, mitigate, avoid or transfer any negative risks (risks without rewards). The figure below shows the ERM organization and its responsibilities with related groups. Financial risks Foreign currency fluctuations, fund management, and increasing operational expenditures are the key risks associated with our financial assets and liabilities. Financial markets remain turbulent, which may raise execution risk for fund operations as well as credit risk premiums for market players. Exposure to foreign exchange fluctuations: Telecommunications operators in Sri Lanka work with worldwide vendors to buy services for telecommunication system operation and maintenance, as well as hardware and software applications, including telecommunication systems. As a result, a substantial amount of our capital and operational expenditures is denominated in foreign currencies, resulting in foreign exchange translation losses. The considerable devaluation of the Sri Lanka Rupee throughout the year had a significant impact on the Company's commercial and industrial operations. We are always trying to increase the amount of foreign cash that flows via our services to overseas operators. This creates a natural hedge, reducing our exposure to currency volatility. Furthermore, we investigate the idea of reducing non-business vital capital expenditures and other obligations in order to reduce foreign currency cash outflows. Economic Risks Changes in local, regional, and worldwide economic conditions might have a significant negative impact on demand for electronic communications, digital services, information technology (IT), and associated services, and hence our operating and financial performance. Last year, economic performance decreased in the second part of the year, causing macroeconomic uncertainty. Niluksha Dulmina MSCP Assignment 01 Taxation: The government's tight tax policy for telecommunications services is hurting the company's bottom line. To make the service more affordable, the government reduced the financing fee on telecommunications services from 25% to 15%. However, a 15% value added tax (VAT), a 2% nation building tax (NBT), and a 2% chess remain charged on telecommunications services. International Telecommunications Tax and IDD Tax are also levied on international services. Because the weight of such levies and taxes rests on the user, demand and usage of communications services may be severely impacted. We, Sri Lanka Telecom including our mobile arm, Mobitel are cognizant of the price sensitive nature of our customers and take proactive measures to prevent such potential revenue losses. 4.2.1 Reflect on your own learning experience in the Cybersecurity Vulnerability Project. Through this project, we were able to learn a lot about the cyber dangers that come to such organizations that earn a lot of income. And Network Engineer Mr. Ananda Samarakoon told me the details of cyber-attacks faced by SLT-Mobitel and how to prevent it. Told about some new security measures. Over the course of a year, Sri Lanka Telecom faced many signal problems. This is due to a cyber-attack by a hacker. The hacker took control of SLT's server machine and then gave SLT a huge amount of money. But because Sri Lanka Telecom did not agree to it, the data of many computers of Sri Lanka Telecom was destroyed. The company suffered huge losses. 4.2.2 State the cybersecurity project objectives derived from the project management process To keep cybersecurity systems up-to-date, goals must constantly evolve. such as switching systems and hacker-implemented technology. More significantly, it must be adaptable. Security controls are also provided for improved monitoring and clarity. Cloud security is very important everywhere. Furthermore, mobile security has an impact wherever the business starts. Cyber criminals' wares are always evolving. It contributes to the development of their technologies and strategies. Niluksha Dulmina MSCP Assignment 01 The technology and ideals we rely on every day are expanding. As a result, current risk initiation is phenomenal. 4.2.3 Explain how the research project will assist the organization in maintaining its performance/security in a remote work environment? Establishing security controls is really important, and managers and IT teams should consider better approaches over time. Another practice that staff can take to supplement remote work security is to conduct a cybersecurity risk assessment. To meet remote work security challenges, additional layers of security must be deployed for every remote worker. Regarding remote service security, SLT should implement an asset management tool that allows members to effectively monitor company assets and provide greater visibility to supervisors and management of SLT company assets. 4.2.4 Key to successful learning: aligning assessment with learning outcomes The matched curriculum is one of the cornerstones to effective learning. This implies that learning objectives are defined, learning experiences are tailored to help students reach those outcomes, and well-planned assessment tasks allow students to demonstrate achievement of those outcomes. The learning outcomes are obvious. The learning experiences are intended to aid in the achievement of certain learning goals. The assessment assignments enable them to demonstrate that they have met those learning outcomes. Niluksha Dulmina MSCP Assignment 01 4.2.5 Designing assessments which allow students to demonstrate their achievement of the learning outcomes Learning assessment may have a significant impact on students' educational experiences. One of the problems of successful assessment is ensuring close alignment between learning objectives, learning activities targeted at reaching learning goals, and assessment tasks used to determine whether learning goals have been fulfilled. Assessment that is matched to learning goals that focus not just on content knowledge but also on process and capacities is currently best practice. 4.2.6 Key assessment terms ASSESSMENT The gathering of data on the kind and extent of learning outcomes/any process used to estimate learners' learning. The phrase comes from the Latin MEASUREMENT Representation of assessment information by a number or grade on a scale of some kind. Answers the question, how much? EVALUATION Making decisions regarding the worth of a grade and/or the nature and extent of learning outcomes. Responds to the inquiry, "How well?" ASSESSMENT A tool or systematic technique for gathering assessment information. TASK FORMATIVE Ungraded assessment activity utilized before or during learning to ASSESSMENT help planning and/or diagnosis, and/or to provide feedback on learning progress/provides advise and feedback that does not contribute grades to the final outcome. SUMMATIVE Graded assessment task used following learning which counts ASSESSMENT towards the final result. VALIDITY The extent to which an assessment task assesses what it is supposed to measure. RELIABILITY The degree to which the assessment task consistently produces the same outcome. Niluksha Dulmina MSCP Assignment 01 NORM- The performance of a group of learners is used to rank order learners, REFERENCED often known as 'grading on the curve.' The number of students who can earn distinctions, credits, passes, or fail is fixed. CRITERION- Establishes performance standards, and every learner who meets the REFERENCED criteria earns the appropriate grade. Every student has the capacity to get the greatest grade. STANDARDS- Establishes the performance criteria and articulates the many degrees BASED of quality in performance that are linked with a grade. Students are graded based on the degree of performance they have attained. AUTHENTIC Assessment tasks that assess if a student can show their learning ASSESSMENT results in a circumstance that is as similar to a real-world context as feasible. 4.2.7 Evaluation of continuing professional development Skills Self-work Evidence of when and how you have used this skill / Quality The talents within me were identifiable Operation Facing difficult situations through the research helped build character and gain new knowledge communication Communication skills improvement through interview research Problem solving Always had the curiosity of problem solving, through this study, the skill had room to improve immensely Achieving aims Satisfaction, inspiration, and overall improvement in decision making Research Expand knowledge base for the research topic Self-esteem, open-mindedness, awareness of one's own thoughts, the ability to learn, the ability to comprehend and regulate one's own emotions, self-confidence, selfdiscipline, self-motivation, the ability to overcome boredom, patience Interpersonal skills Niluksha Dulmina MSCP Assignment 01 4.2.8 Reflection of the work Given the current epidemic, I assumed there would be a dramatic shift to remote work. Working and leading remotely is tough for organizational members with little or no expertise. Those study data indicate the inverse. The change is handled successfully by both management and staff. Productivity is same or improved, attention is raised, meetings are more efficient, and future prospects are improved. Even in firms with no history of remote work initiatives, remote work thrives. However, the questioned employees and secondary sources prefer telecommuting (working from home 1-3 days a week) to a completely remote office. People still require the sociability of the workplace and miss it when forced to work from home. Finding a happy medium between remote and office work will be critical to retaining the positives and balancing the negatives. Managers must be flexible in order for each employee to develop an appropriate schedule that balances remote and office work. Even if remote labor is mostly voluntary in this situation, the perks and downsides transfer pretty effectively. This means that, even if the duration of the crisis is unpredictable, it may be worthwhile to make the appropriate investments (ergonomics, video conferencing, increased socializing, etc.) now rather than later, especially if the intention is to allow for more remote work in the future. Managers will need to be more involved in elements of work that have previously been natural and independent at the office. Specifically, communication and sociability among employees. Because the break room is no longer available, individuals must find other places to interact. Facilitating this new sort of socializing will be critical to ensuring a happy and healthy workforce. I propose that video chatting become a priority in order to reintroduce some body language into conversation. Perhaps a virtual break room might be created with an open video chat server where individuals can come and go as they like. Although video chats might be difficult at first, many industry professionals with considerable expertise in remote work advocate them to bring some personality back into communication. I also feel that when evaluating employee resources, the longterm health implications of less-than-ideal workplaces must be considered. It may not Niluksha Dulmina MSCP Assignment 01 be sufficient to provide them workstations from the workplace, but rather to have desks sent to their houses. Fresh air and exercise should be prioritized, and managers should find methods to reward them among their personnel. Make it a game and reward those that exercise on a daily basis. Although no one can forecast the future, we must anticipate that remote work will become significantly more widespread following COVID-19. Adaptability and flexibility on the part of both managers and employees will be critical to organizational success. So far, remote work has served the majority well, and we must hope that trend continues; nevertheless, it can only do so with the cooperation of all members of the organization. 4.2.9 Future Research The long-term implications of COVID-19-induced telework programs are yet unknown. Longitudinal research has looked at how telework affects physical and mental health, relationships, organizational isolation, and overall telework cohesiveness and productivity. We can only see the short-term effects of remote work during a crisis in this study; the long-term benefits and drawbacks must be investigated further. However, the findings were broadly consistent with past research, and we see no reason why it would not have had a good impact. It will also be fascinating to examine how managers handle crises and long-term remote employment. 4.2.10 Important of project management Time management, planning ahead, and developing a work calendar for the team are all essential. It clearly specifies the project's plan before it begins. Creates an agreed-upon timeline and plan. It lays the groundwork for collaboration. Resources are used wisely. Aids in integration management. It aids in cost control. Niluksha Dulmina MSCP Assignment 01 Quality is continually controlled. The project's strategic framework 5 Reference Cyber Security Risks 2021/10/8 Online Available at: https://www.kaspersky.com/ The Company 2021/10/8 Online Available at: https://www.mobitel.lk/the-company What Is Data Collection 2021/10/8 Online Available at: https://www.simplilearn.com/what-is-data-collection-article Qualitative vs. Quantitative 2021/10/8 Online Available at: https://www.scribbr.com/methodology/qualitative-quantitativeresearch/ Risk Management 2021/10/8 Online Available at: https://www.slt.lk/reports-html/annual/2018/ Cybersecurity Objectives 2021/10/8 Online Available at: https://www.cybersecurity-automation.com/ Special Reference: Ananda Samarakoon Niluksha Dulmina MSCP Assignment 01