Uploaded by Niluksha Dulmina

E126643 Niluksha Dulmina MSCP

advertisement
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
Assessor
Unit(s)
BTEC HND in Computing
Mrs. Anne Sumudu
Internal Verifier
Unit 06: Managing a Successful Computing Project
Managing a Project on cyber security risks due to Remote working
Assignment title
Student’s name
Niluksha Dulmina
List which assessment criteria
the Assessor has awarded.
Pass
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Y/N
Has the work been assessed
accurately?
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria?
• Identifying opportunities for
improved performance?
• Agreeing actions?
Y/N
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Y/N
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
Higher Nationals – Summative Assignment Feedback Form
Student Name/ID
E126643 Niluksha Dulmina
Unit Title
Unit 6 Managing a Successful Computing Project
Assignment Number
1
Assessor
Submission Date
DateReceived1stsub
mission
Re-submission Date
DateReceived2ndsubmissio
n
Mrs. Anne Sumudu
Assessor Feedback:
LO1.Establish project aims, objectives and time frames based on the chosen theme
Pass, Merit & Distinction
P1
P2
P3
M1
Descripts
LO2. Conduct small-scale research, information gathering and data collection to generate knowledge
to support the project
Pass, Merit & Distinction
Descripts
P4
M2
D1
LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & Distinction
P5
P6
M3
D2
Descripts
LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & Distinction
P7
M4
D3
Descripts
Grade:
Assessor Signature:
Date:
Assessor Signature:
Date:
Resubmission Feedback:
Grade:
Internal Verifier’s Comments:
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.
Niluksha Dulmina
MSCP
Assignment 01
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Feedback: Student to Assessor
Assessor signature
Date
ndulmina99@gmail.com
Student signature
Niluksha Dulmina
Date
MSCP
Assignment 01
Pearson
Higher Nationals in
Computing
Unit 6: Managing a Successful Computing Project
Niluksha Dulmina
MSCP
Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as
your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
Word Processing Rules
1.
2.
3.
4.
The font size should be 12 point and should be in the style of Time New Roman.
Use 1.5 line spacing. Left justify all paragraphs.
Ensure that all the headings are consistent in terms of the font size and font style.
Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information.
eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory
information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be
accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in
writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked
to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A
REFERRAL or at worst you could be expelled from the course
Niluksha Dulmina
MSCP
Assignment 01
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of the Pearson UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this
program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I
have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between
myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached to the
attached.
Student’s Signature: ndulmina99@gmail.com
(Provide E-mail ID)
Niluksha Dulmina
Date: 2022/10/10
(Provide Submission Date)
MSCP
Assignment 01
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
E126643 Niluksha Dulmina
Unit Number and Title
Unit 6: Managing a Successful Computing Project
Academic Year
2021/20222018
Unit Tutor
Assignment Title
Vulnerability Assessment - Management Information System Project
Issue Date
Submission Date
IV Name & Date
Submission Format:
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing (refer to the assignment guidelines for more details). You are required to make use
of headings, paragraphs, and subsections as appropriate, and all work must be supported with research and
referenced using Harvard referencing system. Please provide in-text citation and a list of references using
Harvard referencing system.
Please note that this is an individual assessment and your report should include evidences to that you have
conducted a research to collect relevant data individually.
Niluksha Dulmina
MSCP
Assignment 01
Unit Learning Outcomes:
LO1 Establish project aims, objectives and timeframes based on the chosen theme.
LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.
LO3 Present the project and communicate appropriate recommendations based on meaningful
conclusions drawn from the evidence findings and/or analysis.
LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.
Niluksha Dulmina
MSCP
Assignment 01
Assignment Brief and Guidance:
Research Theme: Remote working
Research Topic: What are the key cyber security risks of working remotely e.g. employees
downloading unsecure apps or sharing their work devices with family members?
“The option to work remotely was already being embraced by some businesses in the pre-pandemic era.
These businesses were making some progress to adapt their working practices to accommodate remote
working by allowing those in certain job roles to take the opportunity to work from home, albeit a day or
two a week. However, on the whole there had been a reluctance to have staff working remotely and this
has largely centred around productivity concerns, security implications and technology issues.
The global pandemic however necessitated and accelerated the move to remote working. The vast
majority of businesses have now shifted some or all of their operations online, and almost all of their
staff are working from home. The enabling force behind this necessary shift has been the different
technologies and platforms that facilitate workers to achieve business goals remotely. This sudden shift
to remote working took place within weeks and months and has not been without issues. Several surveys
conducted during this period cited business leaders complaining about how technology problems have
impacted their business and employees while working remotely. The biggest issues remote workers face
are being frequently disconnected from corporate networks, slow file downloads, poor quality of video
meetings and long response times when loading apps. As a result, building secure, effective and
integrated technology capability, to continue this flexibility in the workforce, has now become a priority
for all organizations”. (Pearson, 2020)
You are expected to carry out small-scale research in order to explore the cyber security risks of
working remotely due to the pandemic, from the standpoint of a computing professional. The
research that you carry out can be based on an organization that you have access to gather sufficient
information to investigate the cyber security risks of remote working.
The report should include,
Niluksha Dulmina
MSCP
Assignment 01

A comprehensive project management plan

Evaluation of data collection methods and data analysis tools and/or techniques should be
provided

Appropriate recommendations should be provided

Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance
TASK – 01
1.1 Define the scope of the project and devise aims and objectives of the project that you are going to
carry out. You also should include a brief introduction to the selected company, remote working
process and technologies used, explanation to the project and other relevant information about the
research.
1.2 Produce a comprehensive project plan including the following.

Cost, scope, time, quality, communication, risk, and resources management plan

Comprehensive Work Breakdown Structure (WBS) with clearly defined activities and milestones

Gannt chart to illustrate project schedule with realistic time allocated for each activity and
clearly defined deadlines for milestones.
TASK – 02
Carry out research to investigate the cyber security risks of remote working by applying appropriate
qualitative and quantitative research methodologies and critically evaluate the reliability, accuracy and
the appropriateness of the research methods applied. your answer also should include a critical
evaluation of the project management process and a justification to the selected research
methodologies.
TASK – 03
Niluksha Dulmina
MSCP
Assignment 01
3.1 Analyze research data collected to support your research project using appropriate tools, techniques
and critically evaluate how selected tools, techniques uphold authenticity and the accuracy of the
data collected.
3.2 Draw valid conclusions and recommendations from the research data analyzed and communicate
your recommendations to the top management of the organization through an action plan. The action
plan should include a justification to the recommendations suggested.
TASK – 04
4.1. Reflect on the objectives of the cyber security risks project and your own learning experience
gained through following quality research and the project management process. Critically evaluate the
ways in which the research project carried out supports the organization to sustain its performance/
security in a remote working environment and how the project supported you to improve your own
learning and performance.
Niluksha Dulmina
MSCP
Assignment 01
Grading Rubric
Grading Criteria
Achieved
Feedback
LO1 Establish project aims, objectives and timeframes based on
the chosen theme
P1 Devise project aims and objectives for a chosen scenario.
P2 Produce a project management plan that covers aspects of
cost, scope, time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to
provide timeframes and stages for completion.
M1 Produce a comprehensive project management plan,
milestone schedule and project schedule for monitoring and
completing the aims and objectives of the project.
LO2 Conduct small-scale research, information gathering and
data collection to generate knowledge to support the project
P4 Carry out small-scale research by applying qualitative and
quantitative research methods appropriate for meeting project
aims and objectives.
M2 Evaluate the accuracy and reliability of different research
methods applied.
D1 Critically evaluate the project management process and
appropriate research methodologies applied.
LO3 Present the project and communicate appropriate
recommendations based on meaningful conclusions drawn from
the evidence findings and/or analysis
P5 Analyze research and data using appropriate
tools and techniques.
Niluksha Dulmina
MSCP
Assignment 01
P6 Communicate appropriate recommendations as a
result of research and data analysis to draw valid and meaningful
conclusions.
M3 Evaluate the selection of appropriate tools and techniques for
accuracy and authenticity to support and justify
recommendations.
D2 Critically evaluate the research and data analysis tools
used in the project development stages.
LO4 Reflect on the value gained from conducting the project and
its usefulness to support sustainable organizational performance
P7 Reflect on the value of undertaking the research to meet
.
stated objectives and own learning and performance.
M4 Evaluate the value of the project management process and
use of quality research to meet stated objectives and support
own learning and performance.
D3 Critically evaluate how the project supports sustainable
organizational performance.
Niluksha Dulmina
MSCP
Assignment 01
Unit 6: Managing a Successful Computing
Project
Assignment 01
Assignment Name
: Managing a Successful Computing Project
Student Name
: Niluksha Dulmina
Student ID
: E126643
Batch No
: HND-COM SEP/OCT WEEKDAYS
Lecturer Name
: Mrs. Anne Sumudu
Name of Institute
: ESoft Metro Campus
Date of Submission : 2022-10-10
Niluksha Dulmina
MSCP
Assignment 01
Acknowledgement
This is to acknowledge all those without whom this project would not have been
reality. Firstly, I would wish to thank our Computer Science teacher Mrs. Ann who
gave his immense support, dedicated her time towards it and made us understand how
to make this project. Without her guidance, the project would not have been complete.
Niluksha Dulmina
MSCP
Assignment 01
Niluksha Dulmina
MSCP
Assignment 01
Table of Contents
1
TASK............................................................................................................................... 21
Niluksha Dulmina
MSCP
Assignment 01
Define the scope of the project and devise aims and objectives of the project that you
are going to carry out. You also should include a brief introduction to the selected
company, remote working process and technologies used, explanation to the project
and other relevant information about the research. ....................................................... 21
1.1
What is Project Management? ............................................................................... 21
 The use of procedures, techniques, abilities, knowledge, and experience to
accomplish particular project goals in accordance with predetermined guidelines is
known as project management. Final deliverables in project management are subject to a
limited amount of time and money. ................................................................................. 21
1.1.1
Why is project management important? ....................................................... 22
1.1.2
What does project management involve? ...................................................... 27
1.1.3
Summary of the the project ........................................................................... 27
1.1.4
Information about SLT company .................................................................. 28
1.1.5
Initiation of the project and project planning phase .................................... 29
1.2
2
Produce a comprehensive project plan including the following. ........................ 29
1.2.1
Work breakdown structure ............................................................................ 33
1.2.2
Project summary .............................................................................................. 34
1.2.3
Project overview ............................................................................................... 34
1.2.4
Gantt chart ....................................................................................................... 36
TASK............................................................................................................................... 37
Carry out research to investigate the cyber security risks of remote working by
applying appropriate qualitative and quantitative research methodologies and
critically evaluate the reliability, accuracy and the appropriateness of the research
methods applied. your answer also should include a critical evaluation of the project
management process and a justification to the selected research methodologies. ....... 37
2.1
Project execution phase .......................................................................................... 38
What is data collection? ................................................................................................. 38
2.1.1
Qualitative vs quantitative research............................................................... 41
2.1.2
The cyber security risks of working from home ........................................... 43
2.1.3
Field work ......................................................................................................... 48
2.1.4
Remote Agile: Observations on productivity for less mature teams by SLT
Mobitel 55
2.1.5
Observation 1: Limited informal learning when working remote .............. 56
2.1.6
other
Observation 2: Accountability and trust are hard when you can’t see each
57
2.1.7
Observation 3: Team chat and instant messaging are great, but they can
cause implicit bottlenecks .............................................................................................. 57
2.1.8
Observation 4: Non-work interactions can help the team member engage 58
2.1.9
Key findings ...................................................................................................... 59
Niluksha Dulmina
MSCP
Assignment 01
3
2.1.10
Questions to Assistant Managers .................................................................... 60
2.1.11
Questions to SLT Company Workers ............................................................ 62
TASK............................................................................................................................... 64
3.1 Analyze research data collected to support your research project using
appropriate tools, techniques and critically evaluate how selected tools, techniques
uphold authenticity and the accuracy of the data collected. .......................................... 64
3.1.1
What Is Data Analysis? ................................................................................... 64
3.1.2
Why is Data Analysis Important? .................................................................. 64
3.1.3
Data Analysis about SLT-Mobitel ................................................................. 65
3.1.4
Data Analysis Tools.......................................................................................... 66
3.1.5
Types of Data Analysis Methods .................................................................... 68
3.1.6
Data Analysis consists of the following phases: ............................................. 71
3.2
Interpretation .......................................................................................................... 73
3.2.1
Are developers who work remotely more satisfied with the job? ............... 73
3.2.2
Do remote employees make more money? ..................................................... 74
3.2.3
What are the most common challenges faced when working remotely? .... 75
3.2.4
In what type of organizations are remote work popular?............................ 76
3.2.5
Fundamental Types of Interviews in Research ............................................. 76
3.2.6
Structured Interviews ...................................................................................... 77
Structured interviews are research techniques that are exceedingly rigorous in their
operations and give very little or no opportunity for pushing participants to collect and
assess data. As a result, it is also known as a standardized interview, and its
methodology is heavily quantitative. The questions in this interview are redecided based
on the level of detail requested. ....................................................................................... 77
3.2.7
Personal Interviews .......................................................................................... 77
3.2.8
Telephonic Interviews...................................................................................... 78
 Because of the logistics and time savings, telephone interviews are quickly replacing
traditional "on-site" interviews. It is now more convenient for candidates to have a
phone chat than go to a faraway place. Although the fact that the individual does not
have to be physically present during the interview is a clear advantage, it may also be
one of its distinguishing downsides. ................................................................................ 78
3.2.9
4
Email or Web Page Interviews ....................................................................... 79
TASK............................................................................................................................... 80
4.1
Advantages of Assignments .................................................................................... 80
Assignments are provided to children in order to bridge the gap between what they learn at
school and what they study at home. Assignments are expected to create the required
papers that may be used for further research. To complete the assignment properly, the
statement or question they attempt must be entirely comprehended. .................................. 80
4.1.1
Technical advantages of assignment writing: ............................................... 80
Niluksha Dulmina
MSCP
Assignment 01
4.2 How to face Cyber Security Risks SLT Mobitel company about “Ananda
Samakoon” opinion............................................................................................................ 82
4.2.1
Reflect on your own learning experience in the Cybersecurity
Vulnerability Project. .................................................................................................... 84
4.2.2
State the cybersecurity project objectives derived from the project
management process ...................................................................................................... 84
4.2.3
Explain how the research project will assist the organization in
maintaining its performance/security in a remote work environment? ................... 85
4.2.4
Key to successful learning: aligning assessment with learning outcomes ... 85
4.2.5
Designing assessments which allow students to demonstrate their
achievement of the learning outcomes ...................................................................... 86
5
4.2.6
Key assessment terms ...................................................................................... 86
4.2.7
Evaluation of continuing professional development ..................................... 87
4.2.8
Reflection of the work ...................................................................................... 88
4.2.9
Future Research ............................................................................................... 89
4.2.10
Important of project management ................................................................. 89
Reference ........................................................................................................................ 90
Niluksha Dulmina
MSCP
Assignment 01
1 TASK
Define the scope of the project and devise aims and objectives of the
project that you are going to carry out. You also should include a brief
introduction to the selected company, remote working process and
technologies used, explanation to the project and other relevant
information about the research.
1.1 What is Project Management?

The use of procedures, techniques, abilities, knowledge, and experience to accomplish
particular project goals in accordance with predetermined guidelines is known as
project management. Final deliverables in project management are subject to a limited
amount of time and money.
A basic project management lifecycle covers four stages:

Initiation

Planning
Niluksha Dulmina
MSCP
Assignment 01

Execution

Closure
1.1.1 Why is project management important?

Project success depends on having a project manager to take the initiative and keep
everyone on the same page because projects are frequently complex and include several
stakeholders.
Here are six reasons why you should use project management:

Realistic project planning: One cannot stress the value of project planning.
Organizations frequently overestimate their ability to do tasks fast, underestimate the
expenses, or do both, which is a formula for disaster. An effective project manager
establishes goals, budgets, and schedules that are reasonable and doable while taking
the larger picture into account. A project may swiftly veer off course before it even gets
started without attentive management.
The project manager consults with various stakeholders to gain an understanding of the
initiative's strategic priorities and business objectives in order to determine reasonable
goals, budgets, and timetables. The project manager develops a project plan based on
Niluksha Dulmina
MSCP
Assignment 01
their study, balancing those goals within the limitations of time and money. Resource
management, cost estimation, and risk analysis are all part of this process.

Clear focus and objectives: The most frequent factor contributing to project
failure in 2017 was unclear goals. Project managers assist businesses in defining their
priorities and project goals. The scope and objectives can quickly become jumbled
when project management is left up to the team. Scope creep, missing deadlines, and
overspending can result from a lack of concentration.
In addition, many teams might not be able to identify possible risk factors as they
emerge without a project manager to supervise the project plans and job breakdowns.
The team may decide to prioritize the wrong tasks if they don't handle the changing
project risks.
Niluksha Dulmina
MSCP
Assignment 01

Strategic alignment: Aligning projects with corporate strategy is one of the most
crucial reasons to utilize project management. "If your company is not strong at
project management, you are putting too much at risk in terms of eventually delivering
on plan," warns Mark Langley, president and CEO of PMI. In other words,
organizational strategy is driven by project management. Therefore, you are losing a
significant chance to develop if you aren't using it into your activities.
The general objectives of a project, as well as its succeeding tasks and milestones, are
all made sure to be in line with the organization's strategy by project managers as they
supervise the planning and implementation of a project. Your efforts will advance the
company if they are strategically aligned at every stage of the project, which keeps all
stakeholders on the same page.
Niluksha Dulmina
MSCP
Assignment 01

Managed process: The goal of project management is to enable the appropriate
people do the right tasks at the right time in a proactive manner. Many teams tend to
operate reactively handling problems as they come upon the absence of a defined
project management methodology, as opposed to anticipatorily preparing for known
risks and establishing project goals and parameters from the start.
Project managers work with teams to divide a project into smaller, more manageable
chunks. Project managers may better manage their teams and respond to problems by
dividing the project down into a defined procedure with assigned tasks, dates, and
milestones.

Quality control: Project management is not complete without quality control.
Even if your project is completed on schedule and within the allotted budget, it will
still be considered unsuccessful if the quality requirements aren't satisfied.
Sadly, it's all too simple to slip into this trap. Teams under a lot of pressure to complete
a project on schedule and within a certain budget. And this could result in hurried
effort and subpar performance.
Project managers are useful in this situation. They oversee how well project duties are
carried out in addition to managing timelines and objectives. To ensure that everyone
Niluksha Dulmina
MSCP
Assignment 01
is working toward the same goals, project managers assist in defining quality
standards and deliverables.

Reduced costs: In 2018, 9.9% of every dollar invested was lost owing to subpar
project execution, or $99 million for every $1 billion invested, according to PMI.
Through increased productivity, risk mitigation, and resource optimization, project
management lowers project costs. Even with the additional expense of hiring a project
manager, businesses stand to benefit far more.
Niluksha Dulmina
MSCP
Assignment 01
1.1.2 What does project management involve?

Kick-off meeting: Lay up the facts you have and share the team's aims and high-level
objectives.

Stakeholder analysis: The people who will be impacted the most by the initiative
should be contacted.

Project scope definition: Determine the scope, deliverables, and all requirements.

Work Breakdown Structure (WBS): Break up the project phases into more readily
managed, manageable bits of labor.

Risk management planning: Determine and prepare for the risks that are most likely
to arise during a project's life cycle.

Project review: Concluding a project with a debriefing to extract lessons that can be
included into the organization's knowledge base or best practices
1.1.3 Summary of the the project

IT security for remote employees is one of the numerous challenges that firms must
address as they get ready for what life will be like after a pandemic. Having a remote
workforce has several risks. To finish duties, employees occasionally use their own
devices and home networks.
And you better hope they have technological know-how because your IT team can
only do so much to assist them if they run into any technical problems. About 65% of
remote employees reported experiencing IT issues during the pandemic, and 52% had
to wait up to three hours for the issue to be handled, according to the Velocity Smart
Technology Market Research Report 2022.
However, remote work is here to stay, for better or worse, and the advantages are quite
alluring. In fact, a Gartner poll revealed that 47% of companies provide workers a
choice in their jobs. When asked if they could work remotely full-time when the
epidemic is over, 82% of respondents claimed they could do so at least once a week.
Sri Lanka Telecom (SLT) is one of the firms that gives workers the option to work
remotely. Employees should evaluate the company's remote working policies to see
Niluksha Dulmina
MSCP
Assignment 01
whether they are acceptable. A business has just one second before a catastrophe
occurs.
1.1.4 Information about SLT company

SLT-Mobitel is Sri Lanka’s National Mobile Service Provider and a fully owned
subsidiary of Sri Lanka Telecom. The company offers mobile telephony services,
high-speed broadband, Enterprise Solutions, IDD Services, Mobile Money (mCash)
and a host of Value-Added Services.

SLT-Mobitel was the pioneer in South Asia to launch the first Super-3.5G HSPA
network in South Asia in 2007, and subsequently trialed HSPA+, MIMO (Multiple
Input Multiple Output) in 2009, another first in the region, Mobitel went on to
demonstrate 4G-LTE technology also for the first time in South Asia in 2011.

Accordingly, SLT-Mobitel launched its 4G-LTE Network in 2013 to provide
unparalleled broadband experience to Sri Lankans. Keeping ahead with pioneering
new technologies, SLT-Mobitel trialed 4.5G LTE-Advanced Pro Technology with CA
(Carrier Aggregation) of three bands, again for the first time in South Asia in 2016. In
2017, SLT-Mobitel was able to deploy the first Sub-1G Mobile Broadband Network
in Sri Lanka based on 900MHz spectrum innovatively to provide superior coverage
some rural areas of the country.

In 2018 Mobitel launched the First Commercial 4.5G/4G+ Mobile Network in South
Asia. In April 2019, SLT-Mobitel was the first network in South Asia to successfully
showcase the first 5G deployment over a Mobile Network by connecting a commercial
Mobile smartphone to its 5G network. Fueling over USD 700mn worth of investments
to-date, SLT-Mobitel has shaped the ICT landscape, experiencing exciting growth –
Niluksha Dulmina
MSCP
Assignment 01
poised to lead the industry into its next phase of development. A growing customer
base stands testament to SLT-Mobitel’s strong focus laid on customer centricity. For
more information, visit www.sltmobitel.lk or dial 1717 to reach the Customer Care
Hotline.
1.1.5 Initiation of the project and project planning phase

The purpose of this study is to comprehend how the severe Covid-19 epidemic, which
started in March 2020 and is still running strong as of this writing, may affect slightly
distant and hybrid work arrangements.
Here, study goals should be on the psychological agreement that exists between staff
and management, especially considering cyber danger.

Recognize how various firms have maintained or decreased their exposure to
cyber risk while implementing new methods of functioning.

Examine the methods employed by leaders in cyber security to promote and
maintain a proactive attitude toward cyber security.

The best ways to safeguard team members' emotional well-being and physical
health, and to sustain the effectiveness of teamwork.
1.2 Produce a comprehensive project plan including the following.
Niluksha Dulmina
MSCP
Assignment 01

Purpose: Purpose of this research is to study how the abrupt transition to remote
work effects managers and employees, and to see whether, and in what ways, the
involuntary nature of the current remote work situation changes how remote work is
perceived by employees and managers. Crises are something that we know occur at
different times, such as the IT-crisis in the 2000s and the economic crisis in 2008 and
now the corona crisis. This thesis is timeless in that way that it can be useful for
managers and employees to read and learn what opportunities and challenges remote
work brings and how to manage a crisis by changing the way of working in a smooth
way.
This session offers the chance to prepare and learn about remote work so that you can
effortlessly convert from traditional office work to remote work in times of crisis,
even if the COVID-19 crisis is most likely not the last one. It will be possible to
discover more about how people in both jobs are adjusting to working remotely, as
well as what managers see as hurdles and potential, and whether there are any specific
challenges among employees, by interviewing both employees and managers.
Managers will find our study useful in understanding both their own organizations and
how other managers respond to similar situations.
Our study will be crucial for fostering more openness between managers and
employees. There are benefits and drawbacks to working remotely, and management
should communicate more if there are issues, they really aren't aware of. The key to
remote work's effectiveness is knowing how to manage its drawbacks while keeping
its benefits. Whether the experience is short-term or long-term, the business must
think that the guidance offered by subject-matter specialists may lessen some of the
problems faced by both employees and managers. Many people's everyday tasks have
altered as a result of the crisis, and it is intended that the this thesis will show them
how.

Costs management plan : Cost estimation comes when the project manager
calculates the cost of the resources selected during resource planning at this stage. Due
to the complexity of cost estimation, the project manager must estimate the cost
carefully and accurately by considering a number of different aspects. The most
Niluksha Dulmina
MSCP
Assignment 01
constant elements are overhead costs, corporate budgets, inflation, and fixed and
variable costs.
It is important to remember that accuracy in cost estimates is essential because the
greater the difference between the projected cost and the actual cost, the less likely the
project will be successful. Many estimation methods and models should be used,
including analog estimation, parametric modeling, and the program evaluation and
review method.

Scope management plan: Given that this crisis situation is unusual, studying a
topic as current as this is of utmost theoretical relevance. This extensive shift offers
considerable opportunity for remote work for many employees and supervisors. Even
though the opportunity, time, and scope for testing telework theory are somewhat
constrained, this research should nevertheless offer valuable information that can be
used to enhance the study of telework.
Given the abrupt and unanticipated move to remote work, this circumstance will really
test the trade-offs of remote work in terms of productivity vs socializing and isolation.

Quality management plan : The most crucial aspect of every project is the
project's quality. A project manager must maintain excellent quality to ensure that the
best end results are delivered to stakeholders and clients. As a result, project quality
management is a critical part of the project. However, the challenge that emerges here
is how to assure the project's quality.
Here comes the project quality management plan! A project quality management plan
specifies specific project requirements, project deliverables, quality measurements,
and quality assurance and improvement procedures. Indicators of key performance
KPIs and other quality measurements and indicators aid in determining if output goals
and objectives have been fulfilled. A quality management plan directs the project team
to adhere to specified processes in order to fulfill quality requirements.
Because the project quality management plan is such an important element of the
project life cycle, you must create an effective quality management plan. Here's a stepby-step approach to helping you write your plan:
Niluksha Dulmina
MSCP
Assignment 01

Time management plan: It is preferable to arrive three hours early rather than
one minute late. You've probably heard the popular proverb about the value of time.
Punctuality is a skill that not everyone possesses. However, time is the most crucial
factor of any project for project managers. Time management is one of the ten
knowledge areas in which a project manager must excel in order to obtain the Project
Management Professional (PMP) certification.
Poor time management skills lead to late project delivery, which not only casts doubt
on your abilities but also negatively affects your company's reputation. As you prepare
the initial plans for your project, a time management plan is important. It gives you
specific instructions on how much time you should spend on certain project activity.
A suitable timeline and program help guarantee that you stay on track.

Risk management plan : Every day, a project manager must accomplish
hundreds of obligations till the project is done. Communication is one such obligation.
Effective communication keeps your team on the same page throughout the project. It
also assures openness and the proper separation of tasks. Every seasoned project
manager understands that without a project communication management strategy, it
is impossible to assure that the project is on track. A communication management
strategy assists in the identification of communication networks, people, and
information flow. The team is continually in contact with stakeholders and consumers
thanks to a communication management plan. It enables stakeholders and consumers
to submit input, allowing the team to make necessary adjustments in a timely way and
boost project efficiency.

Resources management plan : A project resource management strategy is an
essential component of every project plan. It identifies the availability and utilization
of resources. It gives guidance for using resources in a cost-effective and efficient
manner. A strong project resource management strategy guarantees that all necessary
resources are accessible in enough numbers, ensuring the project's safety. Labor,
materials, and equipment are all examples of project resources. A project resource
Niluksha Dulmina
MSCP
Assignment 01
management plan serves as a thorough guide at the appropriate moment to include and
maximize each of these available resources. It lowers project risk. You must first
create an effective project resource management strategy before you can implement
it.

Delimitation: This research is only focused on one Sri Lanka Telecom company
due to time restrictions and accessibility. Since various nations have varied levels of
lockdown, with Sri Lanka on the more lenient end of the lockdown and related
suggestions, this will constrain the conclusions of the thesis.
In order to make the research about remote work during the COVID-19 situation,
when the solutions would presumably be less serious, more applicable to the broader
public, news items were picked.
1.2.1 Work breakdown structure
Vulnerabilities
Research Project
1. Initiation
2. Planning
3. Executing
4. Closure
1.1
Define Processes
2.1
Project Planning
development
3.1
Brainstorming
Vulnerabilities
4.1
Project Analyze
2.3
Work
breakdown
Structure
2.4
Gantt chart
3.2
Solicitation
3.3
Vulnerabilities
Research tool
development
4.2
Project reports
1.2
Analyze
Requirement
1.4
1.3
Project charter
charter
Project
approval
development
Niluksha Dulmina
MSCP
Assignment 01
1.2.2 Project summary
Project Summery
Project name
Prepared by
Managing a Project on
Ananda Samarakoon
cyber
security risks due to Remote
working
Project date
07/08/2022 To
08/10/2022
1.2.3 Project overview
Project overview
Tasks action list
Start date
End date
07/08/2022
09/08/2022
Initiation
09/08/2022
12/08/2022
Define process for
gathering
requirement
Niluksha Dulmina
MSCP
Done
Not done
Assignment 01
12/08/2022
15/08/2022
Analyze
requirements
15/08/2022
18/08/2022
Project
development
18/08/2022
22/08/2022
Planning
22/08/2022
25/08/2022
Project plan
development
25/08/2022
27/08/2022
wbs
27/08/2022
30/08/2022
Gannt chart
30/08/2022
03/09/2022
Execution
03/09/2022
06/09/2022
Brainstorming
06/09/2022
10/09/2022
solicitation
10/09/2022
17/09/2022
Vulnerabilities
research tool
17/09/2022
25/09/2022
closure
25/09/2022
30/09/2022
Project analysis
30/09/2022
05/10/2022
Project report end
Niluksha Dulmina
MSCP
Assignment 01
1.2.4 Gantt chart
Niluksha Dulmina
MSCP
Assignment 01
2 TASK
Carry out research to investigate the cyber security risks of remote
working by applying appropriate qualitative and quantitative research
methodologies and critically evaluate the reliability, accuracy and the
appropriateness of the research methods applied. your answer also
should include a critical evaluation of the project management process
and a justification to the selected research methodologies.
Niluksha Dulmina
MSCP
Assignment 01
2.1 Project execution phase
Methods used for information gathering, data collection and material
resourcing

Information may be gathered from a variety of sources. Most critically, there are no
optimum data gathering methods. In general, the method used to gather data is
determined by the nature of the researcher's research or the phenomenon being
examined.
Data gathering is an essential component of every degree of research effort. If the data
is obtained incorrectly, it will undoubtedly alter the study's conclusions, leading to
erroneous or valuable results.
What is data collection?

Before we establish data gathering, we must first define data. The short answer is that
data is any type of information that has been structured in a specific way. As a result,
data collecting is defined as the act of obtaining, measuring, and analyzing correct
data from a number of relevant sources in order to identify solutions to study issues,
answer questions, evaluate results, and anticipate trends and probability.
Our civilization is heavily reliant on data, emphasizing the significance of data
collection. To make educated business decisions, assure quality assurance, and
maintain research integrity, accurate data collecting is required.

During data collecting, researchers must identify data categories, data sources, and
data collection techniques. We will quickly discover that there are several data
collection methods. Data collecting is heavily used in the scientific, commercial, and
government sectors.
Why Do We Need Data Collection?

Before a judge rules in a court of law or a general plan an attack, they must have as
much pertinent data as possible. Informed judgments result in the best courses of
action, and information and data are interchangeable.
Niluksha Dulmina
MSCP
Assignment 01
As we'll see later, the principle of data collecting isn't new, but the world has evolved.
Today, there is significantly more data available, and it exists in formats unheard of a
century ago. To stay up with technology, the data gathering method has had to evolve
and develop.
Whether you're in academia attempting to do research or the commercial sector trying
to sell a new product, you need data collecting to assist you make better decisions.
Methods of data collection

The system of data collection is based on the type of study being conducted.
Depending on the researcher’s research plan and design, there are several ways data
can be collected.
The most commonly used methods are published literature sources, surveys (email
and mail), interviews (telephone, face-to-face or focus group), observations,
documents and records, and experiments.
Literature sources

This entails gathering data from previously published content in the public domain.
Textbooks, government or private company reports, newspapers, journals, internet
published papers and articles are all examples of literature sources. This type of data
collecting is known as secondary data collection. Compared to primary data gathering,
is less costly and takes less time.
Surveys

A survey is another means of acquiring information for research purposes.
Information is obtained using questionnaires, which are typically based on individual
or group experiences with a particular occurrence.
This data can be gathered in a variety of ways. The most noteworthy methods are webbased questionnaires and paper-based questionnaires (printed form). The outcomes of
this kind of data collecting are often simple to analyze.
Niluksha Dulmina
MSCP
Assignment 01
Interviews

The interview is a qualitative data gathering approach whose outcomes are based on
intense involvement with respondents concerning specific research. Interviews are
typically used to get detailed replies from the experts being interviewed.
Structured (formal), semi-structured, or unstructured interviews are all possible
(informal). In essence, an interview technique of data collection can be undertaken in
person with the interviewee(s) or over the phone.
Observations

The observation technique of acquiring information is employed by seeing
individuals in a certain circumstance or place at a specific time and day. Essentially,
researchers examine the behavior of the individuals or situations being investigated.
This style of research can be controlled, natural, or participant driven.
Controlled observation occurs when a researcher follows a set protocol for studying
persons or the surroundings. Natural observation occurs when people are observed in
their natural environment. Participant observation is a technique in which the
researcher becomes a member of the group being researched.
Documents and records

This is the practice of evaluating an organization's existing papers and records in order
to trace changes over time. Records can be tracked by reviewing phone logs, email
logs, databases, meeting minutes, staff reports, information logs, and so on.
For example, a company may want to know why there are so many unfavorable
reviews and complaints about its products or services. In this situation, the
organization will examine product or service data as well as employee-customer
interactions.
Niluksha Dulmina
MSCP
Assignment 01
Experiments

Experimental research is a research approach that examines the causal link between
two variables. One variable can be changed, while the other is measured. These two
variables are referred to as dependent and independent variables, respectively.
Data in experimental research is often gathered based on the cause and effect of the
two variables being researched. This form of research is prevalent among medical
researchers and employs a quantitative research methodology. If you are interested in
my services, please send me a note with your requirements. I will respond as soon as
feasible.
2.1.1 Qualitative vs quantitative research

The nature of the targeted outcome is one of the variables that distinguishes qualitative
from quantitative investigations. Qualitative researchers aim to learn from the
specifics of the testimony of persons they are investigating, often known as their
informants. During the course of a research, conclusions are produced by
accumulating, comparing, and assessing the informants' comments and contribution.
The "why" behind a phenomena, correlation, or behavior is typically the subject of
qualitative study.

In contrast, quantitative data is quantitatively examined to generate a statistical picture
of a trend or link. Such statistical findings may provide insight on cause-and-effect
linkages. They may either validate or refute the study's initial hypothesis. The
consequence, whether great or unpleasant, can raise awareness and prompt action.
Qualitative Research
Non-numerical data is collected and interpreted using qualitative research
methodologies. Some qualitative data sources are as follows:

Interviews

Focus groups

Documents
Niluksha Dulmina
MSCP
Assignment 01

Personal accounts or papers

Cultural records

Observation
The researcher may conduct interviews or focus groups during a qualitative study to
obtain data that is not available in current documentation or records. Interviews and
focus groups can be unstructured or semi-structured to allow for various or unexpected
responses. In an unstructured or semi-structured style, the researcher might ask openended questions and then follow the replies. The replies give a thorough view of each
individual's knowledge, that are then compared with those of other research
participants.
Quantitative Research
Quantitative investigations, on the other hand, necessitate various data gathering
methodologies. Compiling numerical data to investigate causal links among variables
is one of these strategies. Data gathering methods for this sort of study include:

Experiments

Questionnaires

Surveys

Database reports
The procedures described above produce data that is suitable for numerical analysis.
In this situation, questionnaires use a multiple-choice style to provide countable
answers, such as yes or no, which may then be converted into quantifiable data.
Qualitative vs. Quantitative Outcomes

The nature of the targeted outcome is one of the variables that distinguishes qualitative
from quantitative investigations. Qualitative researchers aim to learn from the specifics
of the testimony of persons they are investigating, often known as their informants.
Niluksha Dulmina
MSCP
Assignment 01
During the course of a research, conclusions are produced by accumulating, comparing,
and assessing the informants' comments and contribution. The "why" behind a
phenomena, correlation, or behavior is typically the subject of qualitative study.

In contrast, quantitative data is quantitatively examined to generate a statistical picture
of a trend or link. Such statistical findings may provide insight on cause-and-effect
linkages. They may either validate or refute the study's initial hypothesis. The
consequence, whether great or unpleasant, can raise awareness and prompt action.
Qualitative
Quantitative
Conceptual
Concerned with
understanding human
behavior from the
information’s perspective
Methodological
Assumes a dynamic and
negotiated reality
Data are collected through
participant observation and
interviews
Data are analyzed by themes
from descriptions by
informants
Data are reported in the
language of the informant
Concerned with discovering facts
about social phenomena
Assumes a fixed and measurable
reality
Data are collected through
measuring things
Data are analyzed through
numerical comparisons and
statistical inferences
Data are reported through
statistical analyses
2.1.2 The cyber security risks of working from home

Working from home can be beneficial for work-life balance, flexibility, and the
elimination of a commute, but it also introduces a slew of cybersecurity issues. With
employees relying on personal networks and occasionally their own devices, new
online tools and services, and extra diversions, regulating security measures has
become a nightmare for an IT staff.
According to the Velocity Smart Technology Market Research Report 2021, 70%
of remote employees reported IT issues during the pandemic. With home working
Niluksha Dulmina
MSCP
Assignment 01
seems to be here to stay, even post-pandemic, it's critical to assess your security
measures and ensure that everything is operational and secure.

When the epidemic arrived and everyone started working from home, some of your
workers may have begun utilizing their personal gadgets for work. Whether it's
using mobile phones instead of a work phone, printers, tablets, or laptops, one of
the biggest hazards is a lack of IT security infrastructure. Many employees will not
consider verifying that their mobile devices are encrypted when logging into
corporate accounts, accepting critical conversations from clients, or having
voicemails in their inbox that contain vital data.

Meanwhile, firms are battling to govern remote workers' usage of phones and other
mobile devices, according to CISO's Benchmark Report 2020. Many employees use
their own devices for two-factor authentication, and they may have mobile app
versions of instant messaging applications like Teams and Zoom. Because of the
blurring barriers between personal and professional life, sensitive information is
more likely to fall into an unsecured environment. There is nothing your IT staff
can do to shield you from this enormous issue. Indeed, 52% of respondents in
CISCO's research stated that mobile devices pose a significant risk to cyber
security. Another risk that remotes employees confront is the possibility of phishing
emails being sent by attackers. These are frauds aimed to trick users into disclosing
personal information or downloading a malicious file containing a keylogger. The
perils of phishing should be a major priority at any time, but things are extremely
dangerous during the coronavirus epidemic.

According to a recent survey, there has been a 600% spike in reported phishing
emails since the end of February, with many of them capitalizing on the pandemic's
uncertainty. To mitigate this risk, all work should be done on a business laptop that
is subject to remote access security rules. This should include, at a minimum, twofactor authentication, which reduces the possibility of a thief getting access to an
employee's account. malware and illegal logins are examples of harmful behavior.
This guarantees that the appropriate tools, like as anti-malware software and up-todate programs, are in place to guard against any hazards.
Niluksha Dulmina
MSCP
Assignment 01
It also provides your IT staff with control over the organization's IT infrastructure
and lets them to monitor any dangerous behavior, such as malware and illegal
logins.
There are some overall examples for SLT Mobitel company face in that situation
according to Network engineer of SLT Mobitel “ Mr. Ananda’s ” view:
1. Control the risk: To mitigate the dangers, each firm with employees who work
from home must develop a remote working policy. It contains guidelines for securely
keeping devices, setting and maintaining strong passwords, and an acceptable use
policy for viewing non-work-related websites. Organizations should also explain the
technology solutions they've put in place to secure sensitive data, as well as how
workers may follow suit. We recommend, for example, using two-factor authentication
with any third-party service you use. Although it should not be an issue during the
lockdown, your remote working policy should cover the hazards associated with
employees handling sensitive information in public settings.
When business resumes, employees may utilize corporate devices in locations like
trains and cafés, where opportunistic cyber thieves might lurk without attracting
attention to themselves. Even in the absence of a hostile actor, security issues are just
as likely to occur. Consider how frequently you hear about employees misplacing their
laptop, USB flash drive, or documentation.
2. Unsecure home network connection: Unsecured personal networks are one of
the primary causes of an increase in cyber security concerns when working from home.
Employees may remember to update their devices and antivirus software, but home
router software upgrades are frequently ignored. Personal routers that are not frequently
updated are vulnerable to security flaws that might lead to data leaks.
Furthermore, firewalls will be installed on enterprise networks to monitor traffic and
stop any unwanted activities. Many home routers do not have a firewall, which can lead
to network security holes.
Niluksha Dulmina
MSCP
Assignment 01
3. More use of online tools: Businesses are increasingly more vulnerable to cyber
dangers as they rely more on technology and internet tools. From cloud storage to
emails, attachments, instant messengers, third-party services and platforms like Teams,
Zoom, Hangouts, and Asana, more and more work are being accomplished online. This
certainly provides additional opportunities for fraudsters to get access to company
accounts.
4. Employees can’t spot scams: Unfortunately, one of the most prevalent security
dangers of working from home comes from workers. Employees might accidentally
provide hackers access to their devices or corporate files due to carelessness,
exhaustion, or a lack of expertise. In fact, according to a Society of Human Resource
Management survey, 35% of employees reported feeling fatigued or having little
energy while working from home.
Workers are usually far too distracted with their day-to-day responsibilities to evaluate
cyber security issues, especially if they haven't been educated to do so. Cybercriminals
are always evolving and upgrading methods to defraud individuals and steal data,
therefore it should come as no surprise that employees will occasionally fall for these
deceptions. The quantity of frauds and phishing emails has expanded significantly
throughout the epidemic, making employee ignorance one of the most serious security
threats when working from home.
5. Staff lose sight of security concerns: Even if your organization has taken the
time to educate employees on cyber security threats, it is possible that they will lose
sight of or forget about these concerns when working from home. With the hectic dayto-day, IT security might slide down people's priority lists, and employees are more
likely to be slack about security standards if supervisors are not there to supervise their
behavior. Furthermore, because to the length of the epidemic and its economic
consequences, some employees may be concerned about their employment prospects
or financial situation. According to studies, many workers were planning for the worstcase situation, in which they lost their job, or their firm went bankrupt. In fact,
according to a Deloitte poll, 26% of respondents were tempted to create duplicates of
Niluksha Dulmina
MSCP
Assignment 01
essential firm data as a precaution. Storing internal company data against a worst-case
scenario highlight how critical it is for businesses to act to prevent the loss of corporate
data, intellectual property, and, more broadly, to combat the danger of corporate fraud.
6. Weak passwords: Even if your firm uses VPNs, firewalls, and security tools, your
organization may still be vulnerable if employees use weak passwords on their
accounts. Rather than attempting to breach robust security architecture, fraudsters will
initially attempt to crack accounts with weak passwords. To do this, they employ a
variety of technologies, including password generators and coding bots, to continually
attempt to guess passwords and check accounts for duplicate passwords.
7. Phishing and ransomware: Phishing and ransomware assaults are another huge
hazard to remote employees. Cybercriminals use these scams to trick victims into
giving personal information or putting dangerous software onto their devices. This type
of hazard should already be on employees' radar, but the incidence of such attacks has
increased dramatically during the epidemic.
Phishing emails have increased by almost 600% since the end of February, according
to a database, as cyber-criminals seek to capitalize on the fear and uncertainty caused
by the COVID-19 outbreak. They operate by a criminal impersonating a respectable
source, generally via email, in order to deceive the victim into revealing login
information or sensitive information. The perpetrator will then take or lock this
information and demand a ransom.
8. Unencrypted file sharing: While businesses may consider encrypting files
maintained on their network, they may overlook file encryption when data is transferred
from one location to another. Your organization cannot afford for thieves to intercept
files as they are transmitted, from client account information to consumer data and
financial information. When files are taken in this manner, identity theft, ransomware,
and theft might occur.
Niluksha Dulmina
MSCP
Assignment 01
9. Personal devices: When the epidemic arrived and everyone started working from
home, some of your workers may have begun utilizing their personal gadgets for work.
Whether it's using mobile phones instead of a work phone, printers, tablets, or laptops,
one of the biggest hazards is a lack of IT security infrastructure. Many employees will
not consider verifying that their mobile devices are encrypted when logging into
corporate accounts, accepting critical conversations from clients, or having voicemails
in their inbox that contain vital data.
2.1.3 Field work
Work from home at STL Mobitel

Work from home (WFH) policy at SLT Mobitel:
What do employees think about the WFH policy at SLT Mobitel? Explore insights
about perks, benefits, and flexible hours.
Niluksha Dulmina
MSCP
Assignment 01
Niluksha Dulmina
MSCP
Assignment 01
 Work from home during COVID-19 at SLT Mobitel
How was your experience working at SLT Mobitel during COVID-19? Learn about
working from home owing to COVID-19, as well as employee leadership permissions.
Niluksha Dulmina
MSCP
Assignment 01
 Work from home support at SLT Mobitel
Niluksha Dulmina
MSCP
Assignment 01
Does SLT Mobitel’s management encourage working from home? Investigate the
advantages of working from home, as well as the necessary equipment and resources.
Niluksha Dulmina
MSCP
Assignment 01
 Work-life balance and flexibility at SLT Mobitel
Does SLT Mobitel's management encourage professional development? Learn about
flexibility, leaving during the day, and attending appointments.
Niluksha Dulmina
MSCP
Assignment 01
Niluksha Dulmina
MSCP
Assignment 01
2.1.4 Remote Agile: Observations on productivity for less mature teams by
SLT Mobitel

The consequences of COVID-19 have pushed the adoption of entirely remote teams,
a trend that is expected to persist long after the epidemic has passed. Employers all
across the world have begun to embrace the approach, with businesses such as
Atlassian, Facebook, and Twitter stating that staff would be able to work from home
on a permanent basis. Many firms claim 44% gains in productivity.
Co-located teams have historically been the emphasis of SLT network engineering.
While many current SLT Networking teams already have some distributed processes,
the epidemic has prompted the adoption of a completely distributed model. At this
point, the ways to increasing remote labor productivity and team engagement are quite
well recognized. This SLT Mobitel post discusses various actual insights as well as
prospective techniques to tuning remote SLT team performance.
One of the important conclusions has been that the productivity gains or losses from
remote operations are painfully increased by the maturity of the SLT team, but many
of these may be solved using strategies and tools. various insights about how distant
operations affect SLT team maturity and productivity, particularly for less mature
teams Many of the recommendations are aimed at closing the productivity gap for less
established SLT teams.
Niluksha Dulmina
MSCP
Assignment 01
Maturity factors impacting remote productivity
Limited product knowledge shaped Broad
product
knowledge
shaped
resources narrow focus limited rust and resources Hight level rust and account
visibility.
ability.
2.1.5 Observation 1: Limited informal learning when working remote

Network engineers learn a great deal from their peers through informal and
sometimes unintentional interactions.
For example:

Watching more experienced physical contact problems can teach dos and don'ts.

Poor Wi-Fi signals and Wi-Fi usage Informal discussions about cable choices,
algorithms, and technical approaches are critical to building group knowledge.

These basic troubleshooting steps may not reveal a problem because some
applications perform complex calculations, receive high-speed video, or interact
with large databases.
This can be difficult to replicate in a fully remote model. Less mature SLT teams
suffer from a lack of informal learning with more narrowly focused expertise and
relative levels of networking product knowledge.
Approaches to improve maturity in this area:

Water cooler interactions should be encouraged to use group chat and messaging
facilities, especially for one-on-one discussions.

Enable more opportunities for informal learning. For example, peer code reviews
with online screenshots can help senior team mentor more junior resources.

Documenting processes and best practices is critical to team productivity. At the
very least, utilize a group chat or a forum to collect information in an
unstructured manner.
Niluksha Dulmina
MSCP
Assignment 01

Establish formal learning time for team members to ask questions Set aside
formal learning time for team members to document solutions to queries from
other teams.
2.1.6 Observation 2: Accountability and trust are hard when you can’t see
each other

One of the most difficult issues for completely remote teams is the loss of visibility
and line of sight, which can lead to a lack of trust and accountability. This is
exacerbated when team members have never worked together before. This can lead to
a situation where significant time is spent micro-managing daily activities, creating
reports, following up on activities and influencing team performance at a much finer
level than the daily fixed level.
Approaches to improve maturity in this area:

Clarify and validate definition done across the team Ensure work items are
tracked against definition done in a single source. Use that single source for all
work progress discussions to avoid low-value status checking and reporting
activities.

Concentrate the team on outcomes. When reporting results, they should be
coded.

Use tools to connect the team's output and contributions, as well as to assure
access and exposure to the tools.
2.1.7 Observation 3: Team chat and instant messaging are great, but they
can cause implicit bottlenecks

Group chat and instant messaging are critical tools for remote teams. However, for
less mature teams, group chats can create implicit barriers. Group chat channels can
fill up quickly with questions and requests, hindering more experienced team
members trying to respond, and in turn, making it unclear whether requesters are
getting some of their questions answered.
Niluksha Dulmina
MSCP
Assignment 01
Potential approaches:

Establish time slots for specialists to answer questions from the rest of the
team. Inform individuals and groups that their demands must be priority.

A call is faster than waiting for a response on the team channel for urgent
matters.

Set up retreats or bring in outside specialists to assist less experienced team
members.

Set up a mechanism in which every request in group conversations is
assigned an urgency level.
2.1.8 Observation 4: Non-work interactions can help the team member
engage

Mature teams often have a strong feeling of personal connection, which helps to
promote team identity, engagement, and cooperation. This might be tough to develop
in a less mature remote team. While there is a plethora of research on the value of nonwork contacts, getting team members to communicate dynamically outside of work
can be difficult. Instead, then seeing social time as an extension of work, the aim is to
make it engage, lively, and pleasurable for participants.
Some ideas that have had generally good results:

Divide your social time into reasonable portions. For example, in the last five
minutes of each stand-up, have a team member (appropriately chosen) speak
about a topic of interest to them. A group exercise can be used to cover predetermined themes.

Creating a non-working channel in which team members may post about
themselves while they are not working.
Niluksha Dulmina
MSCP
Assignment 01

Video and face-to-face engagement can help team members connect more
effectively. However, be conscious of how it affects your professional and
personal life.

Agile teams must be cognizant of the performance consequences of distant activities.
While increasing the team's quick maturity should be a goal, there are numerous
approaches to decrease the productivity loss associated with remote operations for less
mature teams. These ideas are applicable to all broad tactics for improving the
performance of a remote workforce.
2.1.9 Key findings
The table below summarizes major results, practical and social ramifications, and pertinent
recommendations from experienced businesses. This will provide a summary of the results.
Key findings
Impacts
Increased
opportunities for
remote work in
the
future (1-4 days
per week)
Keep the good and
eliminate the
majority of the bad.
Poor ergonomics
Can be harmful to
one's physical health
Separation of
work
and leisure is
difficult
for some people
Can be harmful to
one's social life and
mental health
Niluksha Dulmina
Previous
Advice from
experienced
companies
Needs to be further
Many firms now
researched after crisis provide remote
employment, either
part-time or fulltime, and this trend
is expected to
continue.
Adds to previous
Invest in what you
require. Employees
research
benefit from having
the correct
workplace.
Partially Agrees with Allow for flexible
working hours.
previous research
Don't establish
regular habits that
encourage frequent
celebrations, rest,
and physical
exercise.
MSCP
Assignment 01
Positive mental
health impacts
Positive
environmental
impact. More time
for work or play
There is less time for
staff bonding. Work
that is more efficient
Agrees with previous
research
Increased
loneliness
and isolation
Can be harmful to
one's mental health.
Organizational loss
of "team-feeling"
and cohesiveness
Agrees with previous
research
Loss of body
language
Communication
misunderstandings
Agrees with previous
research
Less but more
efficient
communication.
Increased
productivity
More time for other
pursuits.
Socialization loss
Organizational
Benefits
Agrees with previous
research
Less commuting
Fewer casual
interactions
Agrees with previous
research
Encourage workers
to communicate
casually and outside
of work.
Encourage workers
to communicate
casually and outside
of work. Virtually
recreate the
breakroom.
Incorporate video
into meetings and
chats to help recover
some of the missing
body language.
Communicate
clearly and
frequently.
Agrees with previous
research
2.1.10 Questions to Assistant Managers

What industry does your business operate in?

How many staff do you manage?

How many of these employees work remotely?

Have you previously managed remote employees?

Have you used any remote work resources (handbooks, advice, etc.)?
Remote work with Leadership

How did you come up with the manner work would be governed? Bottom-up or topdown?
Niluksha Dulmina
MSCP
Assignment 01

Have you discussed the adjustment with your staff both before and after they began
working remotely? What were the expectations before, and how did they turn out?

How do you assess the effectiveness of remote workers? Is it different from how they
measure at work?

How do you compare work performance between office work and remote
employment?

What are your thoughts on working overtime or overworking?

Have you seen any workers suffering with the separation of work and home life?

Do you strive to assist your staff separate work and home life? If so, how do you
ensure that your workers separate work and family life when they work remotely?

What steps have you taken to ensure that your staff have the tools they need to execute
their jobs?

Do you make certain that they work in a separate location that is as ergonomic as
possible, or do you allow them to select where they work?

To what extent do you monitor your employees? How has trust between you and your
staff evolved?

How do you interact with your employees? How often? What is the difference in
meetings between working in the office and working remotely?

How do you deal with offering feedback when leading remotely? How does it vary
from the "normal" method of providing feedback?

What are your thoughts/policies on non-work conversations? (In general, and during
meetings)

What have you done to encourage colleague socialization? Group gatherings, for
example, or "water cooler" conversations

How important is it to you that all employees be seen and heard? In

How do you ensure that individuals feel heard and included?

How can you ensure your employees' emotional and physical health?

How do your employees seek assistance when it is required? What about the
difference in needing assistance while working remotely versus working in an office?
Are the "issues" the same, or do you believe they have separate issues?

How has sick leave and absence evolved since working from home?
About Opportunities and challenges Question
Niluksha Dulmina
MSCP
Assignment 01

What chances have you observed given the situation with COVID-19 and remote
work?

What challenges do you have while using remote leadership?

What aspect of leadership do you find the most difficult while leading remotely?

What is "new" about leading remotely versus leading in an office?

How will this condition affect your working style in the long run following Covid-19?
2.1.11 Questions to SLT Company Workers

What are your duties in the organization, and what are you doing/working on?

Have you ever worked remotely before?

Is your boss used to handling remote workers?

Have you utilized any handbooks, recommendations, or other resources to help you
transition to remote work?
Remote working

Where do you do your work?

What have you done to enhance the ergonomics of your workspace?

What tools/resources has your management offered for you to build an ergonomic
workspace?

What are your daily routines, and how have they altered since you worked at the
office?

How do you communicate with your coworkers?

Do you believe it is possible to socialize virtually as you would normally?

How do you manage your physical and emotional health?

Does your boss check in on you for causes other than work, and if so, how and how
often?

How essential are fitness and good air quality to you?

Do you believe you are being heard by management?
Niluksha Dulmina
MSCP
Assignment 01

What communication channels are employed to remain in touch with colleagues and
leaders?

What works well with the channels and what would you change?

What do you miss the most about working remotely instead being in an office?

How would you rate your personal productivity when working remotely versus in the
office

Is it the same amount of time to do a task remotely as it is in the office?

How will this circumstance affect your working style (in the long run) after covid-19?
(Problems and opportunities)

What challenges do you have while working remotely vs in an office?

What advantages do you obtain from the current scenario of working remotely as a
result of COVID-19?

How has your need for feedback and assistance evolved when working remotely
versus in the office?

How do you keep business and personal life distinct when working remotely?

Is your management in charge of setting your working hours, or can you change them
to fit your best times?

Do you find it difficult to combine your professional and personal lives?

Is there anything you cannot accomplish remotely?

What type of duties are they? (Something that demands you to be at the workplace)

Do you have trouble focusing when working remotely? What do you do to focus?

Which component of working remotely do you find the most difficult?
Niluksha Dulmina
MSCP
Assignment 01
3 TASK
3.1 Analyze research data collected to support your research project using
appropriate tools, techniques and critically evaluate how selected tools,
techniques uphold authenticity and the accuracy of the data collected.
3.1.1 What Is Data Analysis?

Although many diverse individuals, companies, and professionals approach data
analysis in different ways, the majority of them may be reduced into a one-size-fitsall description. Data analysis is the process of cleansing, manipulating, and analyzing
raw data in order to obtain usable, relevant information to aid in making educated
business choices. The technique reduces the inherent risks in decision making by
offering beneficial insights and data, which are frequently displayed as charts, figures,
tables, and graphs.

A basic example of data analysis is when we make a choice in our everyday lives to
examine what has happened in the past or what would happen if we made that
decision. Essentially, this is assessing the past or the future and making a choice based
on that understanding. The term "big data" is frequently used in data analytics talks.
Data analysis is critical in transforming huge data into valuable knowledge. "What
exactly is data?" Let us return to the core question for neophyte data analysts who
wish to go further by examining big data fundamentals.
3.1.2 Why is Data Analysis Important?

Better consumer targeting: You don't want to waste your company's important
time, energy, and money creating advertising campaigns for demographic groups who
aren't interested in the items and services you provide. Data analysis can assist you
choose where to focus your advertising efforts.

You Will Know Your Target Customers Better: Data analysis measures
how effectively your items and promotions perform among your target population.
Data analysis may help your company gain a deeper understanding of your target
audience's buying patterns, disposable money, and areas of frequent interest. This
Niluksha Dulmina
MSCP
Assignment 01
information assists firms in setting prices, determining the length of advertising
campaigns, and even projecting the volume of product required.

Reduce Operational Costs: Data analysis will show you which sections of your
organization demand more resources and money, and which should be trimmed back
or deleted totally.

Better Problem-Solving Methods: Decisions that are well-informed are more
likely to be effective. Businesses are informed by data. You can see where this
development is going. Data analysis assists organizations in making sound decisions
and avoiding costly blunders.

You Get More Accurate Data: You need data to make educated judgments, but
there's more to it. The essential information must be correct. Data analysis assists firms
in obtaining the required information for future marketing strategies, business
planning, and revamping the company's vision or goal.
3.1.3 Data Analysis about SLT-Mobitel

SLT-Mobitel, as part of the Digital Partnership Program, has entered into a strategic
collaboration with Softlogic IT to introduce data exchange and analytics services. This
enables businesses to adopt an essentially data-driven approach to solving problems
and gaining deeper insights into data using IZAC's 'Data Exchange and Analytics
Platform' and MicroStrategy’s tools and processes. IZAC is the Global Data Exchange
platform by Whiteclay and MicroStrategy is the largest publicly traded independent
analytics and business intelligence company. A strong data management landscape
helps an organization improve its bottom line by prioritizing its sales and operations
efforts. Effective use of decision science has also led to greater clarity in the
organization's messaging and strategy.

The integrated solution will provide enterprises with a subscription-based intelligent
data management service hosted on the SLT-Mobitel Akaza cloud platform. This
solution enables enterprises to visualize data patterns and apply predictive analytics to
make timely decisions and thereby make their business operations more efficient.
Niluksha Dulmina
MSCP
Assignment 01

Sri Lanka Telecom CEO Janaka Abeysinghe said, “SLT-Mobitel recognizes that data
is the new 'source of truth' for enterprise customers when it comes to achieving
sustainable growth and fostering innovation. By partnering with SLT in its journey to
transcend connectivity, cloud and data, we plan to take Sri Lankan organizations to the
next level of decision-making using Data Virtualization, Analytics and AI tools on the
Whiteclay platform. Enterprise Digital Transformation" Mr. Ananda Samarakoon,
CEO, Whiteclay (Pte) Ltd said, “The true value of data science is realized when you
have a good data engineering stack. In today's world, the lack of a strong data
background should not hinder any organization from gaining quick insights from data.

“If a trend line can be identified in the data, analysts should be able to ask the system
'what changed', giving them the flexibility to slice and dice data at a real-time level and
generate a dashboard. their will. If they don't need the dashboard after a few days, they
can discard or edit it. But the point is, deploying such systems in any organization's
environment requires a lot of effort from the technology, strategy and finance teams.
3.1.4 Data Analysis Tools
Best Data Collection Tools for Interviews
For collecting data through interviews, here are a few tools you can use to easily
collect data.

Digital Camera: A digital camera has the advantage of being able to transfer photos
to a display screen when necessary.

Audio Recorder: An audio recorder is a device that records sound onto a disc, tape,
or film. Audio information may suit a wide range of people's demands while also
providing alternatives to print data collecting technologies.

Camcorder: A camcorder is used to record data from interviews. It functions as both
an audio recorder and a video camera. The data presented is qualitative in nature,
allowing responders to thoroughly address the questions posed.
Best Data Collection Tools for Reporting
Niluksha Dulmina
MSCP
Assignment 01
Reporting tools allow you to extract and present data in charts, tables, and other visuals
so that users can discover relevant information. Non-Governmental Organization
(NGO) reports, newspapers, internet articles, and medical records might all be used to
gather data for reporting.

NGO Reports: NGO reports provide an in-depth and comprehensive report on the
NGO's operations, which encompass subjects such as business and human rights. The
content in these papers is research-specific and serves as an appropriate academic
foundation for data collection. NGOs frequently focus on development initiatives that
are established to promote certain causes.

Newspapers: Newspaper data is relatively easy to obtain and is frequently the only
continuous source of event data available. Even if there is a bias problem with
newspaper data, it is nevertheless a legitimate instrument for data collection for
reporting.

Website Articles: Another data collecting method is gathering and utilizing data
included in website content. Data collecting from online articles is a faster and less
expensive method of data collection. The biases inherent in the data gathering
procedure, as well as potential security/confidentiality problems, are two main
downsides of employing this data reporting approach.
Data Collection Tools for Observation
Observation involves the active acquisition of information from a primary source.
Observation can also involve the perception and recording of data via the use of
scientific instruments. The best tools for Observation are,

Checklists: Users can acquire information and make judgements about what they
should know based on state-specific criteria. They provide systematic methods for
gathering data on certain behaviors, knowledge, and abilities.
Niluksha Dulmina
MSCP
Assignment 01

Direct observation: This is an observational research approach for gathering
evaluative data. The evaluator observes the subject in his or her typical setting without
changing anything.
Data Collection Tools for Focus Groups
A focus group is a way of gathering information that is intensively guided and
structured around a series of questions. The meeting's goal is to elicit thorough replies
to these questions from the attendees. The most effective tools for dealing with focus
groups are

Two-Way: One group observes another group respond to the moderator's questions.
After hearing what the other group has to say, the group that listens can foster
additional conversation and perhaps reach different conclusions.

Dueling-Moderator: Two moderators take on the role of the devil's advocate. The
fundamental advantage of the dueling-moderator focus group is that it fosters fresh
ideas by presenting different ways of thinking and varying points of view.
3.1.5 Types of Data Analysis Methods
Niluksha Dulmina
MSCP
Assignment 01
There Are Some Of Them,
1. Cluster analysis: The process of arranging a set of data components in such a way
that they are more comparable (in a certain sense) to those in other groups, thus the
word "clustering." Because clustering has no goal variable, it is frequently used to
uncover hidden patterns in data. Access is also used to offer context to a trend or data
collection. Let's take a look at it from a business standpoint. In an ideal world,
marketers would be able to assess each consumer individually and give them with the
finest tailored service possible but doing so with a big customer base is not feasible.
This is where clustering comes in.
By categorizing clients based on demographics, shopping habits, monetary worth, or
any other element important to your business, you will be able to quickly optimize
your efforts and provide your customers with the greatest experience possible
2. Cohort analysis: This data analysis approach examines and compares a specific
slice of user activity, which may then be grouped with others with comparable
characteristics. This approach can provide a wealth of insight into consumer demands
or a solid grasp of a larger target population. Cohort analysis may be quite valuable
in marketing analysis since it allows you to assess the impact of your ads on certain
groups of clients.
Consider sending an email campaign enticing customers to sign up for your website.
Create two variations of the campaign, each with a distinct design, CTA, and ad text.
Later on, you may use cohort analysis to analyze the campaign's success over time
and determine which types of content are causing your consumers to join up,
repurchase, or interact in other ways.
3. Regression analysis: Regression analyzes historical data to determine how one
(linear regression) or more independent variables (multiple regression) impact the
value of a dependent variable. Understanding the link between each variable and how
it evolved in the past allows you to predict alternative outcomes and make better
Niluksha Dulmina
MSCP
Assignment 01
decisions in the future. Let us illustrate with an example. Assume you conducted a
regression study of your 2019 sales and determined that variables such as product
quality, shop design, customer service, marketing efforts, and sales channels all had
an impact on the total result.
You'd want to utilize regression to see which of these variables changed or whether
any new ones arose in 2020. For example, owing to COVID lockdowns, you might
not be able to sell as much in your physical store. As a result, your sales might have
decreased overall or grown through your online platforms. You may then determine
which independent factors influenced the overall performance of your dependent
variable, yearly sales.
4. Neural networks: The neural network serves as the foundation for machine
learning's clever algorithms. It is a type of analytics that aims to understand how the
human brain generates insights and predicts values with minimum involvement.
Neural networks learn from every data transaction, which means they develop and
progress over time.
Predictive analytics is a common use for neural networks. There are BI reporting
solutions that have this feature built in, such as data pine’s Predictive Analytics Tool.
Users may use this tool to rapidly and conveniently produce many types of forecasts.
Simply pick the data to be processed depending on your KPIs, and the program will
automatically produce estimates based on historical and current data. Anyone in your
business may administer it because to its user-friendly interface; no sophisticated
scientist is required.
5. Factor analysis: Factor analysis, commonly known as "dimension reduction," is a
method of data analysis that describes variability among seen, associated variables in
terms of a possibly smaller number of unobserved variables known as factors. The
goal here is to find independent latent variables, which are good for simplifying
certain parts.
A customer review of a product is an excellent approach to grasp this data analysis
process. The initial evaluation is based on several characteristics such as color, form,
Niluksha Dulmina
MSCP
Assignment 01
wearability, current trends, materials, comfort, where they purchased the goods, and
frequency of usage. Depending on what you want to track, the list might be limitless.
Factor analysis enters the picture in this situation by summing all of these variables
into homogeneous groupings, for as grouping the variables color, materials, quality,
and trends into a new latent variable of design.
6. Data mining: A data analysis strategy that encompasses engineering metrics and
insights for added value, direction, and context. Data mining uses exploratory
statistical assessment to find relationships, linkages, patterns, and trends in order to
develop enhanced knowledge. Adopting a data mining approach is critical to success
when evaluating how to analyze data; as such, it is a subject worth examining more.
Data pine intelligent data alerts are a good application case for data mining. They
deliver automatic signals based on certain instructions or occurrences within a dataset
using artificial intelligence and machine learning. If you're tracking supply chain
KPIs, for example, you might configure an intelligent alarm to go off when incorrect
or low-quality data surfaces. This allows you to go deep into the problem and resolve
it quickly and efficiently.
3.1.6 Data Analysis consists of the following phases:

Data Requirement Gathering

Data Collection

Data Cleaning

Data Analysis

Data Interpretation

Data Visualization
1. Data Requirement Gathering: First and foremost, consider why you want to
do this data analysis. All you need to do is figure out why you're performing data
Niluksha Dulmina
MSCP
Assignment 01
analysis. You had to determine what kind of data analysis you wanted to perform! In
this step, you must select what to analyze and how to assess it, as well as why you are
researching and what methods you will use to do this analysis
2. Data Collection: Following requirement collection, you will have a clear notion
of what you need to measure and what your results should be. It is now time to gather
data depending on the criteria. Remember that once you've acquired your data, it must
be processed or structured for analysis. You must keep a journal containing the
collection date and source of the data as you gather data from multiple sources.
3. Data Cleaning: Now, whatever data is obtained may be useless or unrelated to
your analysis goal, thus it must be cleansed. The obtained data may contain duplicate
records, white spaces, or mistakes. The information should be tidy and error-free. This
step must be completed before Analysis since the results of Analysis will be closer to
what you intended.
4. Data Analysis: The data is ready for analysis once it has been gathered, cleansed,
and processed. As you alter data, you may discover that you have all of the information
you require, or that you need to acquire more. You can utilize data analysis tools and
software during this phase to assist you comprehend, analyze, and draw conclusions
based on the requirements.
5. Data Interpretation: After you've analyzed your data, it's time to interpret your
findings. You may describe or explain your data analysis in a variety of ways,
including in words, a table, or a graphic. Then, based on the outcomes of your data
analysis, determine the best line of action.
Niluksha Dulmina
MSCP
Assignment 01
6. Data Visualization: Data visualization is quite ubiquitous in everyday life; it is
frequently seen in the form of charts and graphs. In other words, facts presented
visually to make it easier for the human brain to absorb and digest. Data visualization
is frequently used to reveal previously undiscovered facts and patterns. You can
discover useful knowledge by detecting relationships and comparing datasets.
3.2 Interpretation
3.2.1 Are developers who work remotely more satisfied with the job?
Very Desapointed
Slightly Disapointed
Slightly Satisfide
Very Satisfide
40
35,535,5
Neither satisfied or disapointed
34
35
30,8
30
27 27
25
20
13
15
10
19
17
12
11
7,8
17,5
8,5
7,5
5
0
Full-Time Remote
Niluksha Dulmina
Partialy Remort Flexibility
Of Work
MSCP
Not Remote
Assignment 01
3.2.2 Do remote employees make more money?
With wage cuts implemented in most regions of the world as a result of the worldwide
pandemic, it is critical to understand earnings before making any decisions. Let us
compare the salary rates of remote developers to those of the others.
Average Annual Salary
26%
Full Time Remote
34%
Partially Remote Flexibility Of
work
Not Remove
40%
Niluksha Dulmina
MSCP
Assignment 01
3.2.3 What are the most common challenges faced when working
remotely?
Challangers
Time Spend Comunting
Toxic work environment
Lack of support from management
Not enough people for the…
Non development works
Non work comitment
Distract work environment
Meetings
0

10
20
30
Meetings
Distract work environment
Non work comitment
Non development works
Not enough people for the worklode
Lack of support from management
Toxic work environment
Time Spend Comunting
40
Meetings, a distracting work environment, and non-work responsibilities are the three
most typical obstacles encountered when working remotely. Non-work obligations
include caring for children and doing housework.
Niluksha Dulmina
MSCP
Assignment 01
3.2.4 In what type of organizations are remote work popular?
Percentage of all remote work
30
25
20
15
10
5
0
Freelancer
2.9
10-19
20-99
100-499
500-999
1000-9999
employees employees employees employees employees employees
10000 or
more
employees
Percentage of all remote work

Smaller firms have a strong culture of remote working. A noteworthy proportion (read
70%) of remote workers operate in firms with less than 100 employees. So, if you
want to work remotely, your best chance is to join a tiny organization or build your
own!
3.2.5 Fundamental Types of Interviews in Research

A researcher must conduct interviews with a group of participants when information
can only be gathered by meeting and personally engaging with a segment of their
target audience. Interviews provide a venue for researchers to prompt their subjects
and get information in the appropriate detail.
Niluksha Dulmina
MSCP
Assignment 01
3.2.6 Structured Interviews
Structured interviews are research techniques that are exceedingly rigorous in their
operations and give very little or no opportunity for pushing participants to collect and
assess data. As a result, it is also known as a standardized interview, and its
methodology is heavily quantitative. The questions in this interview are redecided
based on the level of detail requested.
Advantages of structured interviews

Structured interviews are particularly planned since they focus on the correctness of
diverse replies.

Data can be gathered. Different respondents provide different types of replies to the
same structure of questions; the results can be examined together.

They can be used to contact a huge portion of the target demographic.

The standardization provided by structured interviews simplifies the interview
process.

The same interview structure makes replication across different samples simple.

Because the breadth of detail is already addressed while organizing the interview,
better information can be gathered, and the researcher may conduct a thorough
analysis of the research topic by asking accurate research questions.

Because the framework of the interview is established, it frequently produces solid
findings and is easy to implement.

Because the researcher's interaction with the respondent is informal, the researcher
can easily comprehend the margin of error if the respondent declines to participate in
the survey or is just uninterested in delivering accurate information.
3.2.7 Personal Interviews

Personal interviews, in which questions are asked directly to the respondent, are the
most common form of interviewing. A researcher can use an online survey guide to
record responses. A researcher can tailor his or her survey to capture the interviewee's
main thoughts or ideas.
Niluksha Dulmina
MSCP
Assignment 01
Advantage:

There is a means to alter questions when interviewers and responders are face-to-face
if this is not understood.

If there is uncertainty on both sides or particular information is provided, more
thorough responses are accessible.

While asking questions and taking notes, the researcher has the chance to notice and
evaluate the interviewee's body language.

A high rate of reaction.
3.2.8 Telephonic Interviews

Because of the logistics and time savings, telephone interviews are quickly replacing
traditional "on-site" interviews. It is now more convenient for candidates to have a
phone chat than go to a faraway place. Although the fact that the individual does not
have to be physically present during the interview is a clear advantage, it may also be
one of its distinguishing downsides.
Tips to Clear a Telephonic Interview

Speak clearly and loudly enough to be heard.

Allow the interviewer to do the most of the talking while presenting the directions so
you comprehend. Speaking at random might also irritate the listener.

Speak with a grin. Smiling when speaking affects the curve of your mouth as you say
the words, and the listener can immediately detect this tone shift.

Carry a notepad, a pen, and a copy of your CV with you to write down vital
information.
Advantages:

Having their phone is sufficient to find the interviewers Hand no.

They are frequently inexpensive.

Information is gathered fast.

Personal contact can also help to clarify misconceptions or offer further information
on questions.
Niluksha Dulmina
MSCP
Assignment 01
3.2.9 Email or Web Page Interviews

Individual researchers should adapt to this transformation as online research evolves
as consumers migrate into a more virtual environment.
Interviews done via email or web pages have grown amazingly popular among the
most commonly utilized interviews nowadays as the number of individuals with
internet access has increased. Nothing beats an online survey for this. As more people
purchase online, it is an excellent location to conduct an interview that provides
information to help them make the best selections.
Advantages of email surveys:

Data acquisition rate

Respondents react at their leisure, when and when they want.

Online surveys can be used with other research methodologies or used in conjunction
with a variety of pre-interview arrangements. They are the tools that will allow you to
complete and pay for the project flawlessly.

A researcher may quickly generate a variety of questions, arguments, graphs, and
reports.
Niluksha Dulmina
MSCP
Assignment 01
4 TASK
4.1 Advantages of Assignments
Assignments are provided to children in order to bridge the gap between what they learn
at school and what they study at home. Assignments are expected to create the required
papers that may be used for further research. To complete the assignment properly, the
statement or question they attempt must be entirely comprehended.
4.1.1 Technical advantages of assignment writing:
1) Provides Awareness and Knowledge about Technical Topic

Teachers give several topics to pupils in order for them to get technical expertise.
Some things are beyond their theoretical comprehension.

It also aids in widening their cognitive skill horizon. Students are introduced to
informative insights and important concepts through homework. This is an excellent
method to form an opinion on the subject.
2) Writing Skills Are Improved

Assignments requiring you to produce an essay or a paragraph on a certain topic can
help you develop your writing abilities. Because designing diverse projects sharpens
students' abilities to write and express their thoughts.

They will be able to communicate and explain better when they acquire a writing
habit.
3) Analytical Abilities or Cognitive Abilities Are Also Enhanced

Belittling the value of assignments won’t get us anywhere, as students are able to
enhance and increase their imaginative and mental skills. Their rationality is also
improved at the same time.
Niluksha Dulmina
MSCP
Assignment 01

Assignments provide students the space to experiment and try out ideas and other
innovative methods to deliver their subject in a unique way.
4) Research Traits Are Also Enhanced

Students have the option to conduct research on their topic through
assignments, which allows them to investigate various ideas and examples
concerning their topic.

Conducting research is a vital and enjoyable activity for the human brain to
improve its knowledge base. The research that goes into creating an
assignment enhances students' critical thinking and analytical abilities, as well
as involves students in the university community and delivers benefits and
advantages at the professional level.
Gain a lot of experience out of research like:
Time Management

Because time management and other activities go hand in hand, it's one of the most
sought-after talents that everyone should acquire.

It would be challenging to coordinate your work if you lack time management skills.
If you don't manage your time well, you won't get everything done, and you can even
make bad judgments regarding your work schedule.
Planning and Organizing Skill

You learn to organize and prioritize your work, focusing on the most important tasks
first. Organizing your work will allow you to finish it with peace of mind rather than
going through the headache and turmoil, which will cause you to lose concentration
and miss out on a lot of crucial topics to cover in your assignment when performing
your research.
5) Application of Real-Life Examples Improves Learning
Niluksha Dulmina
MSCP
Assignment 01

This characteristic should be taken into account because the assignments allow
students to apply and link diverse real-life examples with their theme. This method
allows pupils to absorb new levels of knowledge each time they engage in a new
writing project.
4.2 How to face Cyber Security Risks SLT Mobitel company about
“Ananda Samakoon” opinion

The current context of a highly competitive and volatile business environment, market
saturation of telecom operators, OTT players, rapidly changing technology and
economic uncertainties are putting pressure on business operations. Therefore, it is
imperative for an organization to proactively identify business-critical risks and
manage them effectively. Considering the importance, the Board of Directors (BOD)
has instructed to implement effective risk management processes across the
organization. In accordance with the Board's instructions, SLT developed the
Enterprise Risk Management (ERM) process and ERM framework. References have
been made to ERM best practices such as ISO 31000 and COSO, and proper guidance
in this regard has been obtained from Messrs. Deloitte. With the implementation of
the ERM process, SLT has begun to identify and manage its operational risks in dayto-day business operations. Hence, a risk management culture is created in the
organization.

A formal process for reporting risks to the board was introduced to improve and drive
the ERM process. To support this process, a Risk Management Steering Committee
(RMSC) was established under the chairmanship of the Group CEO. This helped to
analyze any acute risks from functional groups and identify key business-critical risks.
Furthermore, the ERM process has been extended to our subsidiaries, including
Mobitel, and the Board reviews group risks at the Audit Committee meeting.

Risk management has now reached maturity in both functional units and project
management and has become an important (BAU) process. It encourages senior
executives to embed the risk management process into functional units. This
empowered them to take properly calculated positive risks (risks with rewards) and to
Niluksha Dulmina
MSCP
Assignment 01
accept, mitigate, avoid or transfer any negative risks (risks without rewards). The
figure below shows the ERM organization and its responsibilities with related groups.
Financial risks

Foreign currency fluctuations, fund management, and increasing operational
expenditures are the key risks associated with our financial assets and liabilities.
Financial markets remain turbulent, which may raise execution risk for fund
operations as well as credit risk premiums for market players.

Exposure to foreign exchange fluctuations: Telecommunications operators
in Sri Lanka work with worldwide vendors to buy services for telecommunication
system operation and maintenance, as well as hardware and software applications,
including telecommunication systems. As a result, a substantial amount of our capital
and operational expenditures is denominated in foreign currencies, resulting in foreign
exchange translation losses.
The considerable devaluation of the Sri Lanka Rupee throughout the year had a
significant impact on the Company's commercial and industrial operations. We are
always trying to increase the amount of foreign cash that flows via our services to
overseas operators. This creates a natural hedge, reducing our exposure to currency
volatility. Furthermore, we investigate the idea of reducing non-business vital capital
expenditures and other obligations in order to reduce foreign currency cash outflows.
Economic Risks

Changes in local, regional, and worldwide economic conditions might have a
significant negative impact on demand for electronic communications, digital
services, information technology (IT), and associated services, and hence our
operating and financial performance. Last year, economic performance decreased in
the second part of the year, causing macroeconomic uncertainty.
Niluksha Dulmina
MSCP
Assignment 01

Taxation: The government's tight tax policy for telecommunications services is
hurting the company's bottom line. To make the service more affordable, the
government reduced the financing fee on telecommunications services from 25% to
15%. However, a 15% value added tax (VAT), a 2% nation building tax (NBT), and
a 2% chess remain charged on telecommunications services. International
Telecommunications Tax and IDD Tax are also levied on international services.
Because the weight of such levies and taxes rests on the user, demand and usage of
communications services may be severely impacted. We, Sri Lanka Telecom
including our mobile arm, Mobitel are cognizant of the price sensitive nature of our
customers and take proactive measures to prevent such potential revenue losses.
4.2.1 Reflect on your own learning experience in the Cybersecurity
Vulnerability Project.

Through this project, we were able to learn a lot about the cyber dangers that come to
such organizations that earn a lot of income. And Network Engineer Mr. Ananda
Samarakoon told me the details of cyber-attacks faced by SLT-Mobitel and how to
prevent it. Told about some new security measures. Over the course of a year, Sri
Lanka Telecom faced many signal problems. This is due to a cyber-attack by a hacker.
The hacker took control of SLT's server machine and then gave SLT a huge amount
of money. But because Sri Lanka Telecom did not agree to it, the data of many
computers of Sri Lanka Telecom was destroyed. The company suffered huge losses.
4.2.2 State the cybersecurity project objectives derived from the project
management process

To keep cybersecurity systems up-to-date, goals must constantly evolve. such as
switching systems and hacker-implemented technology.

More significantly, it must be adaptable. Security controls are also provided for
improved monitoring and clarity.

Cloud security is very important everywhere. Furthermore, mobile security has an
impact wherever the business starts.

Cyber criminals' wares are always evolving. It contributes to the development of their
technologies and strategies.
Niluksha Dulmina
MSCP
Assignment 01

The technology and ideals we rely on every day are expanding. As a result, current
risk initiation is phenomenal.
4.2.3 Explain how the research project will assist the organization in
maintaining its performance/security in a remote work environment?

Establishing security controls is really important, and managers and IT teams should
consider better approaches over time.

Another practice that staff can take to supplement remote work security is to conduct
a cybersecurity risk assessment.

To meet remote work security challenges, additional layers of security must be
deployed for every remote worker.

Regarding remote service security, SLT should implement an asset management tool
that allows members to effectively monitor company assets and provide greater
visibility to supervisors and management of SLT company assets.
4.2.4 Key to successful learning: aligning assessment with learning
outcomes
The matched curriculum is one of the cornerstones to effective learning. This implies
that learning objectives are defined, learning experiences are tailored to help students
reach those outcomes, and well-planned assessment tasks allow students to
demonstrate achievement of those outcomes.

The learning outcomes are obvious.

The learning experiences are intended to aid in the achievement of certain learning
goals.

The assessment assignments enable them to demonstrate that they have met those
learning outcomes.
Niluksha Dulmina
MSCP
Assignment 01
4.2.5 Designing assessments which allow students to demonstrate their
achievement of the learning outcomes

Learning assessment may have a significant impact on students' educational
experiences. One of the problems of successful assessment is ensuring close alignment
between learning objectives, learning activities targeted at reaching learning goals,
and assessment tasks used to determine whether learning goals have been fulfilled.
Assessment that is matched to learning goals that focus not just on content knowledge
but also on process and capacities is currently best practice.
4.2.6 Key assessment terms
ASSESSMENT
The gathering of data on the kind and extent of learning
outcomes/any process used to estimate learners' learning. The phrase
comes from the Latin
MEASUREMENT Representation of assessment information by a number or grade
on a scale of some kind. Answers the question, how much?
EVALUATION
Making decisions regarding the worth of a grade and/or the nature
and extent of learning outcomes. Responds to the inquiry, "How
well?"
ASSESSMENT
A tool or systematic technique for gathering assessment information.
TASK
FORMATIVE
Ungraded assessment activity utilized before or during learning to
ASSESSMENT
help planning and/or diagnosis, and/or to provide feedback on
learning progress/provides advise and feedback that does not
contribute grades to the final outcome.
SUMMATIVE
Graded assessment task used following learning which counts
ASSESSMENT
towards the final result.
VALIDITY
The extent to which an assessment task assesses what it is supposed
to measure.
RELIABILITY
The degree to which the assessment task consistently produces the
same outcome.
Niluksha Dulmina
MSCP
Assignment 01
NORM-
The performance of a group of learners is used to rank order learners,
REFERENCED
often known as 'grading on the curve.' The number of students who
can earn distinctions, credits, passes, or fail is fixed.
CRITERION-
Establishes performance standards, and every learner who meets the
REFERENCED
criteria earns the appropriate grade. Every student has the capacity
to get the greatest grade.
STANDARDS-
Establishes the performance criteria and articulates the many degrees
BASED
of quality in performance that are linked with a grade. Students are
graded based on the degree of performance they have attained.
AUTHENTIC
Assessment tasks that assess if a student can show their learning
ASSESSMENT
results in a circumstance that is as similar to a real-world context as
feasible.
4.2.7 Evaluation of continuing professional development
Skills
Self-work
Evidence of when and how you have
used this skill / Quality
The talents within me were identifiable
Operation
Facing difficult situations through the
research helped build character and gain
new knowledge
communication
Communication skills improvement
through interview research
Problem solving
Always had the curiosity of problem
solving, through this study, the skill had
room to improve immensely
Achieving aims
Satisfaction, inspiration, and overall
improvement in decision making
Research
Expand knowledge base for the research
topic
Self-esteem, open-mindedness, awareness
of one's own thoughts, the ability to learn,
the ability to comprehend and regulate
one's own emotions, self-confidence, selfdiscipline, self-motivation, the ability to
overcome boredom, patience
Interpersonal skills
Niluksha Dulmina
MSCP
Assignment 01
4.2.8 Reflection of the work
Given the current epidemic, I assumed there would be a dramatic shift to remote work.
Working and leading remotely is tough for organizational members with little or no
expertise. Those study data indicate the inverse. The change is handled successfully
by both management and staff. Productivity is same or improved, attention is raised,
meetings are more efficient, and future prospects are improved. Even in firms with no
history of remote work initiatives, remote work thrives. However, the questioned
employees and secondary sources prefer telecommuting (working from home 1-3 days
a week) to a completely remote office. People still require the sociability of the
workplace and miss it when forced to work from home. Finding a happy medium
between remote and office work will be critical to retaining the positives and
balancing the negatives. Managers must be flexible in order for each employee to
develop an appropriate schedule that balances remote and office work.
Even if remote labor is mostly voluntary in this situation, the perks and downsides
transfer pretty effectively. This means that, even if the duration of the crisis is
unpredictable, it may be worthwhile to make the appropriate investments
(ergonomics, video conferencing, increased socializing, etc.) now rather than later,
especially if the intention is to allow for more remote work in the future. Managers
will need to be more involved in elements of work that have previously been natural
and independent at the office. Specifically, communication and sociability among
employees. Because the break room is no longer available, individuals must find other
places to interact. Facilitating this new sort of socializing will be critical to ensuring a
happy and healthy workforce. I propose that video chatting become a priority in order
to reintroduce some body language into conversation. Perhaps a virtual break room
might be created with an open video chat server where individuals can come and go
as they like.
Although video chats might be difficult at first, many industry professionals with
considerable expertise in remote work advocate them to bring some personality back
into communication. I also feel that when evaluating employee resources, the longterm health implications of less-than-ideal workplaces must be considered. It may not
Niluksha Dulmina
MSCP
Assignment 01
be sufficient to provide them workstations from the workplace, but rather to have
desks sent to their houses. Fresh air and exercise should be prioritized, and managers
should find methods to reward them among their personnel. Make it a game and
reward those that exercise on a daily basis. Although no one can forecast the future,
we must anticipate that remote work will become significantly more widespread
following COVID-19. Adaptability and flexibility on the part of both managers and
employees will be critical to organizational success. So far, remote work has served
the majority well, and we must hope that trend continues; nevertheless, it can only do
so with the cooperation of all members of the organization.
4.2.9 Future Research

The long-term implications of COVID-19-induced telework programs are yet
unknown.
Longitudinal research has looked at how telework affects physical and mental health,
relationships, organizational isolation, and overall telework cohesiveness and
productivity. We can only see the short-term effects of remote work during a crisis in
this study; the long-term benefits and drawbacks must be investigated further.
However, the findings were broadly consistent with past research, and we see no
reason why it would not have had a good impact. It will also be fascinating to examine
how managers handle crises and long-term remote employment.
4.2.10 Important of project management

Time management, planning ahead, and developing a work calendar for the team are
all essential.

It clearly specifies the project's plan before it begins.

Creates an agreed-upon timeline and plan.

It lays the groundwork for collaboration.

Resources are used wisely.

Aids in integration management.

It aids in cost control.
Niluksha Dulmina
MSCP
Assignment 01

Quality is continually controlled.

The project's strategic framework
5 Reference

Cyber Security Risks
2021/10/8 Online
Available at: https://www.kaspersky.com/

The Company
2021/10/8 Online
Available at: https://www.mobitel.lk/the-company

What Is Data Collection
2021/10/8 Online
Available at: https://www.simplilearn.com/what-is-data-collection-article

Qualitative vs. Quantitative
2021/10/8 Online
Available at: https://www.scribbr.com/methodology/qualitative-quantitativeresearch/

Risk Management
2021/10/8 Online
Available at: https://www.slt.lk/reports-html/annual/2018/

Cybersecurity Objectives
2021/10/8 Online
Available at: https://www.cybersecurity-automation.com/
Special Reference: Ananda Samarakoon
Niluksha Dulmina
MSCP
Assignment 01
Download