1 Change Management 2 Changes to the Project Plan n Changes are a fact of life & a potential source of disaster ä Who authorises changes? ä Who pays.

Slides:



Advertisements
Similar presentations
Managing the Health and Safety of Contractors
Advertisements

Chapter 2 Analyzing the Business Case.
1 Information Systems Development (ISD) Systems Development Life Cycle Overview of Analysis Phase Overview of Design Phase CP2236: Information Systems.
Planning for Risk and Change Geoff Leese Sept 1999 revised Sept 2001, Jan 2003, Jan 2006, Jan 2007, Jan 2008, Dec 2008 (special thanks to Geoff Leese)
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1998 by Carnegie Mellon.
Sustainable Energy Systems Overview of contractual obligations, procedures and practical matters KICK-OFF MEETING.
CSCU 411 Software Engineering Chapter 2 Introduction to Software Engineering Management.
Chapter 3 Managing the Information Systems Project
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
1 Info 1409 Systems Analysis & Design Module Lecture 5 - Feasibility HND Year /9 De Montfort University.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Computer Security: Principles and Practice
Computer Security Fundamentals
Task analysis 1 © Copyright De Montfort University 1998 All Rights Reserved Task Analysis Preece et al Chapter 7.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
 QUALITY ASSURANCE:  QA is defined as a procedure or set of procedures intended to ensure that a product or service under development (before work is.
1 Principles of Information Systems, Ninth Edition Chapter 13 Systems Development: Design, Implementation, Maintenance, and Review.
Picture 1 model: ICT lifecycle in a company 1. business needs & business strategy 2. ICT strategy - ICT assessment - ICT strategic plan - ICT implementation/tactical.
University of Palestine software engineering department Testing of Software Systems Fundamentals of testing instructor: Tasneem Darwish.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Introduction to ISO New and modified requirements.
10 Two-sided Platforms 1 Aaron Schiff ECON
Network Security Essentials Chapter 1
Additional Unit 2 Lecture Notes New Instructional Design Focus School of Education Additional Unit 2 Lecture Notes New Instructional Design Focus School.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
[ §3 : 1 ] 2. Life-Cycle Perspective Overview 2.1 Motivation 2.2 Waterfall Model 2.3 Requirements in Context.
© 2006 Prentice Hall Leadership in Organizations 4-1 Chapter 4 Participative Leadership, Delegation, and Empowerment.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Experimental Research Methods in Language Learning Chapter 16 Experimental Research Proposals.
Fundamentals of Information Systems, Third Edition1 Systems Design Answers the question “How will the information system do what it must do to solve a.
Introducing Bookkeeping Wagga Summary Sometimes people use the same term to define an Accountant and a Bookkeeper, they both take part in the accounting.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
PLANNING ENGINEERING AND PROJECT MANAGEMENT By Lec. Junaid Arshad 1 Lecture#03 DEPARTMENT OF ENGINEERING MANAGEMENT.
SFDV Principles of Information Systems Lecture 5: Designing the Solution.
1 Risk Management 2 n IEEE defines risk as: “the likelihood of an event, hazard, threat or situation occurring and its undesirable consequences” [Std.
Business and Personal Finance
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
Module 4: Systems Development Chapter 14: Design And Implementation.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Reuse Course: # The Johns-Hopkins University Montgomery County Campus Fall 2000 Lecture # 2 - September 14, 2004.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
BSA 385 Academic professor/tutorialrank.com For more course Tutorials
Architecture Tutorial 1 Overview of Today’s Talks Provenance Data Structures Recording and Querying Provenance –Break (30 minutes) Distribution and Scalability.
PPA 502 – Lecture 9b How to Communicate Evaluation Findings.
Application Analysis. Application Interaction Model The purpose of analysis is to understand the problem so.
Incorporating Road Safety Audit into Development Control Kevin Nicholson Principal Consultant.
BSA 385 Entire Course FOR MORE CLASSES VISIT BSA 385 Week 1 DQ 1 BSA 385 Week 1 DQ 2 BSA 385 Week 2 Individual Assignment Frequent.
1 Requirements Analysis Lecture # Recap of Requirements Elicitation - 1 Requirements elicitation deals with discovering requirements for a software.
Accounting systems design & evaluation 9434SB 18 March 2002.
Language Appropriate for Comparing a Fact Pattern to a Case.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
BSA 385 Week 4 Individual Assignment Frequent Shopper Program Part 3 For the items specified in the technical architecture document developed for the Frequent.
Principles of Information Systems Eighth Edition
Training processes for extension education
SA Capstone Requirements and Design Week 10 SYST Winter 2016
Chapter 6 Negotiating access and research ethics
System Design, Implementation and Review
Unit 6 Application Design Practice Assignment.
Fundamentals of Information Systems, Sixth Edition
Decision Support Systems Course
Chapter 17 Risks, Security and Disaster Recovery
COIT20235 Business Process Modelling
The Object-Oriented Thought Process Chapter 05
Communication and Consultation with Interested Parties by the RB
Unit 6: Application Development
Information Systems, Ninth Edition
Information Systems Development (ISD) Systems Development Life Cycle
Unit IV – Chapter 2 V-Test Model.
Presentation transcript:

1 Change Management

2 Changes to the Project Plan n Changes are a fact of life & a potential source of disaster ä Who authorises changes? ä Who pays for them? ä What about the knock on effects? ä How do you ensure that late changes are reflected in the documentation? ä How do you make sure your project does not change course?

3 Controlling Change n A clear change plan specifying who can request/authorise changes n A procedure for evaluating and costing changes n A procedure for documenting changes n A change control plan is a standard part of project management documentation

4 Change Management Plan n Change Request n Change Specification n Change Analysis n Costing & feasibility n Change decision n Change implementation & documentation

5 And the downside - n May be perceived as bureaucratic n Restricts responsiveness to user needs n Emphasises costs and control rather than user needs

6 Different Types of Changes n Distinguish between minor changes which affect an aspect of the project n Major changes which can cause the whole project to change direction n What kind of factors might affect the whole project?

7 Examples n What would be the implications of a change to the specification – extend the network to another 5 rooms on site? n What are the implications of using a different platform? n What are the implications of late requests for changes to the interface?

8 Summary n This lecture looked at the requirement for a change plan and the problems of managing change n Hughes et al chapter 4