Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

W4inAsgm

ASSIGNMENT INSTRUCTIONS:

Background

This stakeholder identification/analysis process involves identifying project stakeholders regularly and analyzing and documenting relevant information regarding their interests, involvement, interdependencies, influence, and potential impact on the success of the project. Relevant information about project stakeholders is gathered to determine stakeholders’ expectations, their level of support for the project, their interest in the project, their position in the organization or role on the project. Stakeholders are categorized according to their level of interest/influence/authority or power over the project. This analysis and resulting information form the basis for the stakeholder register.

Assignment Prompt

Once you have read this week’s assigned reading and fully understand the identify/analyze project stakeholder process, respond to the following assignment prompts:

Using the group project scenario, conduct an analysis of the project and identify the key stakeholders of the project (up to eight).

Consider the power and/or interest of each stakeholder (use the Power/Interest Grid). 

Complete an analysis of your group project stakeholders based on your identification and analysis of the project stakeholders.

Using this information, develop a project stakeholder register for your group project.

Assignment Instructions

Download the Stakeholder Analysis template provided and save a copy with your last name in the file name. Complete the sections in this template and submit the file to the assignment. Review the Individual Assignment grading rubric to understand how this assignment will be graded.

NOTE: Bellow is a grabbed picture of the assignment Instructions and rubric in case it doesn’t appear clearly in the text:

NOTE:

Below is a grabbed picture of the Group (Group 9) Project that was given, just for you to have an idea of what the Group project scenario may look like, as I noticed this was made mentioned of in my assignment instruction (the main instruction) above.

Rubric Name: Individual Assignment – Stakeholder Analysis

A (Superior 90-100)

B (Satisfactory 80-89)

C (Needs Improvement 0-79)

Accurately identified the logical/key project stakeholders or stakeholder groups

8 or more individual stakeholders or stakeholder groups were identified for the group project.

Accurately identified the impact of the project on all stakeholders.

For all stakeholders, accurately identified the level of influence on the project.

Accurately identified the important aspects of the project to the stakeholder.

Accurately identified how the stakeholder could contribute positively to the project or hinder the project.

Identified clear strategies for engaging stakeholder.

Exceptional use of the stakeholder management templates provided in the assignment instructions. Includes a stakeholder analysis matrix and stakeholder register in MS Word. No errors in spelling/grammar/word usage found.

Identified most of the key project stakeholders or stakeholder groups.

5 or more individual stakeholders or stakeholder groups were identified for the group project.

Identified some of the impact of the project on most of the stakeholders.

For some of the stakeholders, identified the level of influence on the project and many of the important aspects of the project to the stakeholder.

Suggests how the stakeholder could contribute to the project or hinder the project.

Identified many strategies for engaging stakeholder.

Used the stakeholder management templates provided in the assignment instructions. Includes a stakeholder analysis matrix and stakeholder register in MS Word. A few errors in spelling/grammar/word usage were found.

Identified a few of the key project stakeholders or stakeholder groups for the group project but are missing several key stakeholders.

Fewer than 5 individual stakeholders or stakeholder groups were identified for the group project.

Identified project stakeholders or stakeholder groups but these stakeholders would not be considered key stakeholders based on the project scenario.

Does not identify the impact of the project on all stakeholders or the level of influence the project stakeholder has over the project.

For all stakeholders, accurately identified the level of influence on the project.

Fails to identify how the stakeholder could contribute positively to the project or hinder the project.

Clear strategies for engaging stakeholder are absent from the stakeholder analysis.

Does not use the stakeholder management templates provided in the assignment instructions. There were many errors in spelling/grammar/word usage.

image1.png

image2.png

image3.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?