Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Information Systems Assignment

Please review attachments

Student Name: _________________

Program: Project Management Essentials

Lesson 12 Assignment

Lesson 12 Assignment Handout

Assignment Instructions

For this assignment, you will develop a stakeholder register based on the information in the project overview. The project overview and a template table have been provided in the handout below. Your task is to determine the following information and enter it into the stakeholder register table:

Stakeholder name: Identify at least eight (8) stakeholders for the sample project. Because you don’t know individuals’ names, you should focus on putting their title (e.g. IT director) or functional role. Remember that stakeholders can be one person or a group of people.

Project role: Populate the expected project role each stakeholder will fill. Are they a team member? A subject matter expert?

Area of influence: Indicate the area of influence for each stakeholder. What part of the project do they influence or will be influenced by? Are they in charge of resources? The budget? Will they design a system?

Influence level: Estimate the level of influence for each stakeholder. Does this stakeholder have a low, medium, or high level of influence? This should be your best guess as to the probable level of influence.

Classification: Indicate the desired engagement level classification defined (unaware, resisting, neutral, supporting, or leading) for each stakeholder.

How to Create a Good Stakeholder Register

A good stakeholder register answers essential questions as you move forward in the project. Here are some questions that can be helpful as you seek to identify stakeholders:

Who will be directly impacted or affected by this project?

Who may be indirectly impacted or affected by this project?

Who may have influence over how this project is implemented?

Who has required expertise and his or her contribution to the project is essential to project success?

Who are the managers that your team reports to? (may influence project assignments)

Who will use the immunization system?

Who will generate reports?

Who will make the determination that this project is a success or failure?

Who is financing this project?

For this assignment, you will create a stakeholder register for the project described below:

Project Overview

You work for the local school district. A new mandate has been handed down that requires every school to record all verified student immunization records into the state immunization database. While it’s not new to verify student immunizations, it has been limited to individual schools and most often a paper-based system. Now paper systems will be converted to a digital system for the entire state. Parents will be able to access the system to get their child’s records, and doctors will update records whenever new immunizations are administered. The good news is that no new computer hardware is needed. The State is providing the immunization system infrastructure and will manage it. However, the school district IT department will need to build the interface to the system.

The project must be completed before enrollment begins next September when the new school year begins. Schools within the district will be required to produce and provide reports to the school board demonstrating they are using the system and tracking each student until immunizations are current and included in the state immunization database. You will need to develop a process to confirm each incoming student has a record in the state immunization database, provide training on the process for each school’s staff, and create a communication plan to inform parents of this new mandate.

Submission Instructions

You may submit your completed assignment using the following template. This template will serve as a starting point for your stakeholder register.

Stakeholder Register

Name

Project Role

Area of Influence

Influence

Low/Medium/High

Classification

(unaware/resisting/neutral/supporting/leading)

<your name>

Project manager

Project management

High

Leading

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VII

see attached. CybersecurityPolicies Without Borders This assignment measures your mastery of ULOs 2.1, 2.2, 2.3, 5.3, and 6.2. Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions:

Information Systems VI Aassignment

see attached. Course Textbook(s) Lewis, T. G. (2020). Critical infrastructure protection in homeland security: Defending a networked nation (3rd ed.). Wiley.

power point

Video Presentation As a synthesis of the prior five weeks, each student will create an informational video presentation. The video presentation must be a Senior Executive Level presentation to a real world company/organization. If students are unfamiliar with that style of presentation, they are to research it.  Application of Learning:

V

see attached During the Bush and Obama administrations and because of 9/11, the Department of Homeland Security (DHS) assumed lead responsibilities for many of the CIKR sectors assigning Sector-Specific Agencies (SSAs) to establish sector-specific protocols for protection. However, most of these sectors have the DHS as its SSA. Under this

IV Journal

see attached. Should the private sector be proactively involved in all phases of preparedness for attack avoidance (either physical or cyber-based) or should the private sector act solely as a resource when called upon by the public/government sector? Why, or why not? Your journal entry must be at least 200

SA

see attached  Begin by researching and identifying a critical infrastructure sector or component (there are 18 of them to choose from) such as power, finance and banking, or municipal services. Perform an analysis of the selected component, identifying its vulnerabilities. After conducting your research, either in the CSU Online Library

Course Closure

  Congratulations on reaching the end of this course! This week: Discuss the salient manner in which you would apply the learning outcomes of this course to your professional and/or personal life. Talk about the topics you found most valuable or useful, either personally or professionally.

Relational Set Operators

  A relational database model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as “union” and “intersect” may be used. Describe a business scenario where a “union” relational set operator may be used to merge two similar data sets. Analyze the analysis and data consistency

Concurrency Control

  There are times when a database is accessed by many users across the enterprise. Transaction logs can help maintain concurrency in a multiuser platform. Describe at least two business scenarios where “commit” and “rollback” would be required. Describe how these functions would be essential for business continuity and concurrency

Healthcare Industry Solutions: Transforming Patient Care and Operational Efficiency

Healthcare industry solutions refer to a wide range of technologies, tools, and strategies designed to improve the way healthcare organizations operate and deliver patient care. These solutions combine software, digital platforms, data analytics, medical devices, and process innovations to address challenges in hospitals, clinics, pharmaceutical companies, insurance providers, and the

Comprehensive SharePoint and Teams Migration Solutions

   Modern businesses depend on collaboration and document platforms to stay productive, and moving these systems during a tenant migration is often complex. CloudBik’s Teams to Teams Migration offers an effective way to transfer Teams environments, including chats, channels, and files, without impacting end-users. At the same time, the SharePoint

Why Businesses Need Tenant to Tenant Migration

   The need for Tenant to Tenant Migration is growing as many companies go through mergers, acquisitions, or restructuring. Having data in two separate tenants can create confusion and extra work for IT teams. Moving everything into one tenant gives users a simple and unified experience. The OneDrive Migration Tool

Easy Data Transfer from Google to Office 365

  Many businesses choose Microsoft 365 over Google Workspace because it connects better with apps like Excel, Teams, and Outlook. But during migration, the main worry is losing data or breaking folder structures. The migrate from Google Workspace to Office 365 blog explains how to transfer emails, calendars, and files safely

HIS-D40-C

I have a question about Health Information System, who can help with questions?

HIS-B39-C

My questions are about Health IS. Who can help with these questions?

Advanced SQL and PL/SQL

  Extracting and interpreting data can be very valuable to an organization. Describe the importance of using sub queries in a database system. Provide at least two business case scenarios to support your response.

creating

Create a Visual Origin Story In Module 1 you are to complete the team-building exercise ” Visual Origin Story: Adventures in collaborative storytelling .” This exercise is from the book:  Murdoch-Kitt, K. M., & Emans, D. J. (2020). Intercultural collaboration by design drawing from differences, distances, and disciplines through visual