Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

This assessment aims to foster students’ ability to evaluate and determine project viability, including the analysis required in the selection process. This will also form a part of students’ ability...

1 answer below »
This assessment aims to foster students’ ability to evaluate and determine project viability, including the analysis required in the selection process. This will also form a part of students’ ability to create project portfolios that meet an organisation’s strategic goals and requirements and analyse project lifecycles and the processes involved in project development. Students will also demonstrate the criteria required to evaluate the success of projects based on an organisation’s goals, strategy, and standards, as well as analyse the project lifecycle and the process involved in project development.
Answered 12 days After Aug 17, 2024

Solution

Dilpreet answered on Aug 29 2024
8 Votes
STAKEHOLDER MANAGEMENT PLAN         2
STAKEHOLDER MANAGEMENT PLAN
Table of Contents
Introduction    3
Risk Analysis    3
Risk Identification    3
Risk Register    11
Risk Assessment Grid    13
Stakeholder Management Plan    15
Identification of the Stakeholder    15
Stakeholder Analysis    17
Strategy for Stakeholder Engagement    19
Conclusion    21
References    23
Introduction
This report focused on the risk analysis and potential stakeholders’ management plan for a proposed project for an “Integrated Patient Management System” (IPMS). The potential risks of this project have been identified here and the descriptions have been provided of those risks. Risk analysis has been performed through the risk register, and risk assessment grid. In addition to this, the stakeholder management plan was done through the identification of the stakeholders of this project. The stakeholder analysis of the identified stakeholders has been done here through some models and frameworks.
Risk Analysis
Risk analysis of this IPMS project has been done by identifying the potential problems of this project. A risk register has been developed with the likelihood and impact level on the project along with the mitigation strategies. A risk assessment grid is also provided here to depict the likelihood and consequences of the risk.
Risk Identification
The identified risks around this project are specific to the possible technological e
ors and potential implementation challenges.
    Identification
    Analysis
    Risk No.
    Date raised
    Description
    Risk Type
    Status
    Risk Owne
    Cause
    Effect
    Existing controls
    01
    5/6/2024
    One of the major risks of this project is around the data security and privacy risk which can be impactful while migrating the data from the previous system to the new system. Data
eaches and unauthorised access to customers’ data are the most common challenges these days for a technology-based project (Saxena et al. 2020). The patient information might become public due to these challenges.
    Operational
    Open
    IT team
    Poor technological infrastructure.
    It can publicise the sensitive and confidential information of the customers.
    Effective encryption approach
    02
    12/6/2024
    Another key challenge for this project might come while implementing the new system on the existing software. Facing difficulty while implementing the new IPMS within the existing systems can lead to data consistency and loss in the data validation (Riedmaier et al. 2021). The project manager might face this challenge while encrypting the new system in the different departments of this project.
    Operational
    Open
    IT integration team
    Poor adaptation of the management
    It can delay the overall project.
    Assessment of compatibility and engagement with IT professionals
    03
    18/6/2024
    In a workplace, there are several employees and staff who have not been updated with advanced technologies (Johnson et al. 2020). This is an extremely common issue for an organisation that is looking to enhance the technological advancement of its activities. In this context, those specific staff and employees resist the management to take a practical approach to the change of the traditional technologies. This is also a high potential risk around this project if the healthcare professionals and staff resist the management from implementing the new system.
    Strategic
    Open
    Change management team
    Lack of technological knowledge
    It can cause delay in the project
    Providing training to the old existing employees for the advanced technology
    04
    28/6/2024
    Missing the deadlines and delaying the overall project are also the key challenges and potential risks of this IPMS project. Completing a project within the deadline is important for the stakeholders and having a delay in completing the objective can cause of series of dissatisfaction for the stakeholders (Omoush, 2020). These delays can occur due to technical issues, vendor delays, and resource management challenges. All of these individual issues can create a huge impact of delaying the overall business and losing the interest of the stakeholders.
    Strategic
    Open
    Project Manage
    Several small disruptions regarding technological failure.
    It can decrease the interest of the stakeholders.
    Developing new working schedule with realistic deadlines including a buffer period.
    05
    6/7/2024
    High implementation cost for a project is also a key challenge for the completion of this IPMS project. The rapid change in market demand and economy can cause high implementation costs for a project (Elia et al. 2021).
    Operational
    Open
    Finance Manage
    Lack of analysis of market trends and cost of different materials.
    It can cause budget constraints for the project.
    Performing detailed cost-benefit analysis
Risk Register
    Risk Description
    Chances of the risk to occu
    Impact of the risk if occurs
    Severity
    Owne
    Mitigation Strategy
    Risks around data security
    High
    High
    High
    It Team
    Implementing effective mitigation strategy with strong data encryption.
    System implementation challenge
    Medium
    Medium
    High
    Integration and implementation team
    Conducting some compatibility assessments and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here