Professional Documents
Culture Documents
Page 1
Table of Contents
Table of Contents
1. Project Charter
1.1 Company Information
1.1.2 Project Description
1.1.3 Project Objectives and Success Criteria
Scope
Time
Budget
1.1.4 Approach
1.1.5 Primary Stakeholders:
1.1.6 Start and Finish
1.1.7 Budget
1.2 Stakeholder Analysis
1.3 Communication Strategy
1.3.1 Managing and Resolving Breakdowns in Communication
1.3.2 Team Communication Strategies
1.3.3 Communicating Amongst A Distributed Team
2. Project Scope Statement
2.1 Project Justification
2.2 Product Scope Description
2.2.1 Hardware Requirements
2.2.2 Software Requirements
2.2.3 Quality Requirements
2.2.4 Integration Requirements
2.2.5 Support Requirements
2.2.6 Vendor Compliance Requirements
2.2.7 Documentation Requirements
2.3 Product Deliverables
2.3.1 Hardware Deliverables
2.3.2 Software Deliverables
2.3.3 Documentation Deliverables
2.3.4 Services Deliverables
2.3.5 Project Management Deliverables
3. Work Breakdown Structure
3.1 WBS Tree
3.2 WBS Table
4. Estimation
4.1 Choice of Technique
4.2 Justification
4.2.1 Function Point Counting
Ace System Solutions Response to CrimTrac Tender V3.0 2015
Page 2
Page 3
Page 4
10.1.2 Workbook 2
10.1.3 Workbook 3
10.2 Task List
Submission 1
Submission 2
Submission 3
10.3 TimeSheets
11. Appendixes
11.1 Appendix A - Sample Change Request Form
PROJECT CHANGE REQUEST FORM
1. PROJECT DETAILS
Name of Project
Project Identification #
Page 5
1. Project Charter
Revision History
Date
Ver.
Author
Addition/Alteration
10/08/2015
1.1
All
Group was established, the document template was set up, sections
1.1 was worked on as a group outlining what roughly went on under
each heading and the SDLC was chosen.
12/08/2015
1.1
All
14/08/2015
1.1
All
14/08/2015
1.1
David Ley
Approach
14/08/2015
1.1
Samantha OSullivan
14/08/2015
1.1
Brenton Millers
14/08/2015
1.1
Samantha OSullivan
Stakeholder Analysis
14/08/2015
1.1
David Ley
Finished Approach
14/08/2015
1.1
Samantha OSullivan
16/08/2015
1.1
Benjamin Ivarsson
16/08/2015
1.1
Benjamin Ivarsson
17/08/2015
1.1
David Ley
19/08/2015
1.1
David Ley
24/08/2015
1.1
David Ley
26/08/2015
1.1
All
27/08/2015
1.1
Samantha OSullivan
28/08/2015
1.1
Samantha OSullivan
28/08/2015
1.2
Benjamin Ivarsson
29/08/2015
1.2
David Ley
29/08/2015
1.2
Samantha OSullivan
30/08/2015
1.3
Benjamin Ivarsson
Page 6
1.3
Brenton Millers
30/08/2015
1.3
Samantha OSullivan
30/08/2015
1.3
David Ley
25/09/2015
2.1
Benjamin Ivarsson
Page 7
Page 8
Scope
Project Objectives
Success Criteria
Approved by
Brenton Millers
Page 9
Project Objectives
Success Criteria
Approved by
Brenton Millers
Brenton Millers
Project Objectives
Success Criteria
Approved by
Brenton Millers
Time
Brenton Millers
Project Objectives
Success Criteria
Approved by
Brenton Millers
Brenton Millers
Budget
Page 10
1.1.4 Approach
The project will be produced using an Incremental Approach with waterfall development in each
increment. The project is broken down into its initial requirements and then prioritised to develop
a project plan. Each increment will add new functionality to the developing system, and
depending on project requirements, each incremental step can use a different development life
cycle.
By using an Incremental approach with waterfall increments, ASS guarantees stable releases of
each increment. This is supported by the incremental approach, which provides a range of
benefits including operational feedback from an early stage, issues with requirements or
functionality can be seen and rectified early as the system is developed and the returns on
investment comes earlier. By using waterfall in each developed increment, an increment can be
formally documented and fully developed before replacing current NAFIS systems.
This also enables ASS to fully develop two or more increment modules (such as fingerprint and
palmprint simultaneously developed) before releasing the increments for implementation into
the NAFIS system.
ASS has chosen this approach because
- The system has a large detailed list of requirements.
- To minimize costs should the scope of the project change
- For quick deployment of each system increment
- Each requirement is its own increment of the project
By using an incremental approach for this project, ASS can make use of several software
development life cycles (SDLC) depending on the requirements for each project increment. With
the incremental approach, the development team can fluidly move from a waterfall SDLC in
each that will be incrementally added to the subsystem replacing NAFIS.
Page 11
Key Stakeholders
Stakeholders
Phase
Duration
1.
2.
3.
4.
5.
2 Weeks (April)
Page 12
1.1.7 Budget
The required budget to complete every required component from the tender is estimated to a
total of $1,684,122.00 AUD.
Item
Total
Hardware
$85,000.00
Software
$7,500.00
Infrastructure
$50,000.00
$1,388,520.00
Subtotal
$1,531,020.00
$153,102.00
$1,684,122.00
Page 13
Name
Position
Internal/
External
Contact Information
Type
Nicole Rose
Chief Executive
Officer
Director Governance
Chief Operating
Officer
Chief Information
Officer
Chief of Staff &
Executive Director
Transition and
Change
Chief Architect
Project Manager
Senior Business
Analyst
Lead Programmer
Database Specialist
Server Specialist
Client Liaison Officer
Internal
n.rose@crimtrac.gov.au
Leading
Internal
Internal
s.lee@crimtrac.gov.au
n.mayo@crimtrac.gov.au
Leading
Leading
Internal
l.walton@crimtrac.gov.au
Leading
Internal
c.nixon@crimtrac.gov.au
Supporting
Internal
External
External
c.nixon@crimtrac.gov.au
brenton.millers@griffithuni.edu.au
sam.osullivan@grffithuni.edu.au
Supporting
Leading
Supporting
External
External
Internal
External
david.ley@griffithuni.edu.au
john.ivarsson@griffithuni.edu.au
c.geeves@crimtrac.com.au
l.potter@griffith.edu.au
Supporting
Supporting
Supporting
Supporting
External
N/A
Supporting
Steven Lee
Nicole Mayo
Lee Walton
Carolyn Nixon
Carolyn Nixon
Brenton Millers
Sam OSullivan
David Ley
Ben Ivarsson
Callum Geeves
Leigh-Ellen
Potter
End Users
The stakeholder register has a massive influence of the project and the impact that each
stakeholder will have, and how they will affect the project. Each level of stakeholders will have a
different influence on the project. An example of this is the priority tier which consists of
stakeholders that are generally in charge of these areas. The three tiers are put into priorities
and are done by level of importance over the crucial assignment.
These stakeholders require a high amount of influence over the project and are crucial to the
success of the project. The second tier does not contain as much power over the project as they
may not change the outcome of the project. Although these stakeholders in this instance are still
primary stakeholders. The third tier are considered the clients that will be using the new product.
They will have specific requirements when looking into the new product. The clients will know
they are after and what will work for their situation and what will not work for their situation. This
tier does not influence the product but are extremely important to the success of the new
product. It is important that this tier is not forgotten about. Each tier has been carefully planned
to communicate with the stakeholders. The tiering system is used because the project affects all
the stakeholders at different levels.
Page 14
Information Needs
Frequency
Methods
Formality
CrimTrac Board of
Directors
- Progress Reports
- Budgetary Concerns
- Once Monthly
High
- Professional
- Formal
CrimTrac Executive
Committee
High
- Formal
High
- Professional
CrimTrac Procurement
Officers
- Face to Face
- Email
- Phone
High
- Social with the Lead
Programmer
High
- Professional
State Government
Agencies and Law
Enforcement
High
- Professional
Contracted Hardware
Vendors
High
- Professional
Database Staff
Medium
- Social within the Project
Team
System Training
Facilitators
- Email
- Phone
Medium
- Social within the Project
Team
Leigh-Ellen Potter
Customer Liaison Officer
Medium
- Social within Project
Team
- Formal with all
interactions with CrimTrac
Page 15
Brenton Millers
Project Manager
Medium
- Social within the Project
Team
- Formal with all
interactions with CrimTrac
Samantha OSullivan
Business Analyst
Medium
- Social within Project
Team
- Formal with all
interactions with CrimTrac
David Ley
Lead Programmer
Medium
- Social within the Project
Team
- Formal with CrimTrac
Procurement Officer
Benjamin Ivarsson
Systems Analyst
Medium
- Social within the Project
Team
- Formal with the CrimTrac
Procurement Officer
Page 16
Communication between the stakeholders and the project team will be via email to all
concerned parties.
Meetings will be arranged face to face when required and the initial meeting with all
relevant stakeholders.
All team members will be kept up to date with all relevant information that is important to
their part of the development of the project.
Development meetings will be arranged with the team members at the beginning of each
development stage.
There will also be individual increment at the end, and these meetings will be when the
necessity arises.
All email communication will will be kept short and concise only relating to one topic,
unless a necessity to refer to another topic.
If there is a lot of information an email will be sent to organise a face to face meeting
between any relevant stakeholders.
Page 17
Ver.
Author
Addition/Alteration
10/08/2015
1.1
All
The group during a group meeting discussed how the system will
function and agreed on what we will be developing for the system
17/08/2015
1.1
Brenton Millers
21/08/2015
1.1
Brenton Millers
22/08/2015
1.1
Brenton Millers
23/08/2015
1.1
Brenton Millers
26/08/2015
1.2
Brenton Millers
27/08/2015
1.2
Brenton Millers
28/08/2015
1.2
Brenton Millers
29/08/2015
1.3
Brenton Millers
30/08/2015
1.3
Brenton Millers
07/09/2015
1.4
Brenton Millers
Page 18
Requirement
Priority
Priority
Rating
R 1.01
Desirable
High
R 1.02
Palm and Footprint Scanner which will facilitate the capture of Biometric
Data to be stored within the system.
Desirable
High
R 1.03
High quality digital camera for Facial Recognition, which will facilitate the
capture of Biometric Data to be stored within the system.
Desirable
High
R 1.04
Desirable
Medium
R 1.05
Custom Firmware for Palm Print Scanner for standardisation within the
system. (All devices look and run the same; Data being sent from the
device is to a standard read directly into the system).
Desirable
Medium
Functional Requirement
Priority
Priority
Rating
FR 2.01
The system will have Fingerprint Capture Service which will enable users
to capture and transmit Biometric Data (Fingerprint, Palm Print, Footprint,
Demographic Data) and associated data using user provided devices
(Tablet, Desktop, Mobile Phone).
Mandatory
High
FR 2.02
The system will have Fingerprint Storage Service which will facilitate the
automated storage of biometric data (Fingerprint, Palm Print, Footprint)
and management of its associated data (Capture events, history, retention
and deletion).
Mandatory
High
FR 2.03
The system will have Fingerprint Datasets Service to allow the creation of
subsets of Fingerprint, Palm Print and Foot Print database in discrete
datasets for various applications.
Mandatory
Medium
FR 2.04
Mandatory
High
Page 19
enrolment of a new set of Fingerprint, Palm Print and Foot Prints with an
image file and any meta data.
FR 2.05
Mandatory
High
FR 2.06
The system will have Facial Capture Service which will enable users to
capture and transmit Biometric Data (Facial Images, Demographic Data)
and associated data using user provided devices (Tablet, Desktop, Mobile
Phone).
Mandatory
High
FR 2.07
The system will have Facial Storage Service which will facilitate the
automated storage of biometric data (Facial Images) and management of
its associated data (Capture events, history, retention and deletion).
Mandatory
High
FR 2.08
The system will have Facial Datasets Service to allow the creation of
subsets of Facial Image database in discrete datasets for various
applications.
Mandatory
Medium
FR 2.09
The system will have Facial Enrolment Service to facilitate the enrolment
of Facial Images with metadata.
Mandatory
High
FR 2.10
The system will have Facial Quality Checking Service checks the quality
of the images provided during enrollment.
Mandatory
Medium
FR 2.11
Mandatory
High
FR 2.12
The system will have Demographic Data Storage Service will allow for the
storage and management of Demographic Data associated with the
biometric data. It will also provide means for users to directly input data
and upload data.
Mandatory
Medium
FR 2.13
The system will have Identity Management Service will link the Biometric
Data to an Identity Record.
Mandatory
Medium
FR 2.14
The system will have Forensic Information Service which provides the
ability to search, view and extract information from multiple data sources
accessible by the new system.
Mandatory
Medium
FR 2.15
The system will have Dashboard Service that will provide a user
accessible interface to monitor a range of information (real-time
monitoring of matching status, workload stats, matching outcomes, job
scheduling, system availability, system performance). It will house a range
of user configurable fields based on the user's role.
Mandatory
High
FR 2.16
The system will have Data Exchange Service which allows for the
conversion and exchange of data between users and with agencies
external to the stakeholders.
Mandatory
High
FR 2.17
The system will have Identity Report Service which will provide a series
of reports for users to generate. This includes reports for (Demographic
Details, Biometric Data, Fingerprints, Palm Prints, Face Images,
Enrolment Data Records) and user reports.
Mandatory
Medium
FR 2.18
The system will have Support Service which will provide support
technicians with tools and information required for maintaining the system.
Mandatory
Medium
Page 20
FR 2.19
The system will have Change Management Service which will provide
provision training and the associated materials for the system and its
services; list the new functionalities and services to the system; list
changes to existing and specialist services to support business
Mandatory
Low
FR 2.20
The system will have Biometric in a Box software that enable the system
for portable operations as required.
Mandatory
Medium
FR 2.21
The system will have Expert Shared Service to allow a shared pool of
Fingerprint and Facial experts.
Mandatory
Medium
FR 2.22
The system will have Service Integration Service which will allow
integration to systems external to the system (within and externally to
CrimTrac)
Mandatory
Medium
FR 2.23
The system will have Business Workflow Service that will enable users to
customise their Business Workflows within the system (alerts, set
business rules, progress work).
Mandatory
Low
FR 2.24
The system will have Device Procurement Service which will allow the
users to acquire capture devices for use with the system.
Mandatory
Medium
FR 2.25
The system will have the ability for the system to source data from new
information providers.
Mandatory
Low
FR 2.26
The system will have streamlined user interface which will allow access
to all features of the system based on user access levels (access
information, start search, compare previous searches, access reports).
Mandatory
High
FR 2.27
The system will have User Access Control component controlling the
levels of access each user to the system and the data they can retrieve
from the system.
Mandatory
Medium
FR 2.28
The system will have the ability to install additional capabilities (Retinal,
Voice, DNA) as new technology emerges.
Mandatory
Medium
FR 2.29
The system will have an application written for a mobile device which
allows complete access to the system and its features remotely.
Desirable
High
FR 2.30
The system will use disaster recovery capability that does not involve
outages of the system with immediate recovery time.
Mandatory
High
FR 2.31
Desirable
Medium
R No.
Technical Requirement
Priority
Priority
Rating
TR 2.01
Mandatory
High
TR 2.02
Mandatory
High
TR 2.03
Desired
High
TR 2.04
Desired
High
TR 2.05
Mandatory
High
Page 21
TR 2.06
Interface runs in all of the major web browsers (Chrome, Firefox, Edge,
Internet Explorer).
Desired
Medium
TR 2.07
Mobile applications are written for all the major mobile operating systems
(iOS, Android, Windows).
Optional
Low
TR 2.08
Mandatory
High
TR 2.09
System supports matching of One to Many, One to One, One to Few for
all implemented biometric modalities.
Mandatory
High
Requirement
Priority
Priority
Rating
R 3.01
Desirable
High
R 3.02
Optional
Medium
R 3.03
Optional
Medium
Requirement
Priority
Priority
Rating
R 4.01
Mandatory
High
R 4.02
Mandatory
High
R 4.03
Mandatory
High
Requirement
Priority
Priority
Rating
R 5.01
Mandatory
Medium
R 5.02
Service desk & technical support for the system and services
Mandatory
Medium
R 5.03
Mandatory
Medium
Page 22
R 5.04
Support available 24/7 365 days for all users of the system.
Mandatory
High
Requirement
Priority
Priority
Rating
R 6.01
Mandatory
High
R 6.02
Mandatory
High
R 6.03
System complies with all MOU and SLAs between all Stakeholders.
Mandatory
High
R 6.04
Desirable
High
Requirement
Priority
Priority
Rating
R 7.01
Mandatory
High
R 7.02
Documentation detailing all products and services that are used by the
system and how it is all linked.
Optional
Medium
R 7.03
Desirable
Medium
R 7.04
Desirable
Low
Page 23
Deliverable
Description
Due Date
D 1.0
24/06/2016
D 1.1
08/07/2016
Deliverable
Description
Due Date
D 2.0
NAFIS System
24/03/2017
D 2.0.1
11/07/2016
D 2.0.2
Fingerprint Module
08/07/2016
D 2.0.3
05/07/2016
D 2.0.4
02/09/2016
D 2.0.5
Facial Module
04/11/2016
D 2.1
Biometrics in a Box
25/11/2016
D 2.2
Mobile Application
02/12/2016
Deliverable
Description
Due Date
Page 24
D 3.00
06/05/2016
D 3.01
17/02/2017
D 3.02
17/02/2017
D 3.03
24/02/2017
D 3.04
Hardware Documentation
11/11/2016
D 3.05
02/12/2016
D 3.06
Biometrics in a Box
Documentation
24/02/2017
D 3.07
20/02/2017
D 3.08
Matching Algorithm
Documentation
13/05/2016
D 3.09
18/03/2016
D 3.10
Support Documentation
03/03/2017
D 3.11
Standards Documentation
10/06/2016
Deliverable
Description
Due Date
D 4.0
Ongoing support.
April 2017
D 4.1
April 2017
Page 25
Deliverable
Description
Due Date
D 5.0
03/02/2017
D 5.1
System Handover
27/03/2017
D 5.2
20/05/2016
D 5.3
20/05/2016
D 5.4
Change Report
24/03/2017
D 5.5
24/03/2016
Page 26
Ver.
Author
Addition/Alteration
30/8/2015
1.3
David Ley
10/09/2015
2.1
Brenton Millers
21/09/2015
2.1
Brenton Millers
22/09/2015
2.1
Brenton Millers
23/09/2015
2.1
Brenton Millers
24/09/2015
2.1
Brenton Millers
25/09/2015
2.2
Brenton Millers
25/09/2015
2.2
David Ley
16/10/2015
3.0
Benjamin Ivarsson
Page 27
Page 28
Predecessors
(References ID)
ID
Section
Task name
1.1
1.1.1
Identify Stakeholders
4 days
1.1.2
3 days
1.1.2.1
1 days
1.1.2.2
1 days
1.1.2.3
1 days
1.1.3
1 days
1.2
10
1.2.1
2 days
11
1.2.2
0.5 days
10
12
1.2.3
0.5 days
11
13
1.3
Stakeholder Management
14
1.3.1
0.5 days
12
15
1.3.2
0.5 days
14
16
1.3.2.1
0.2 days
17
1.3.2.2
0.2 days
16
18
1.3.2.3
0.1 days
17
Page 29
19
1.4
Scope Management
13
20
1.4.1
2 days
18
21
1.4.2
1 days
20
22
1.4.3
1.5 days
21
23
1.5
Estimations
3 days
19
24
1.5.1
3 days
22
25
1.5.1.1
2 days
26
1.5.1.2
Estimate Budget
1 days
27
1.6
Change Management
28
1.6.1
1 days
26
29
1.6.2
1 days
28
30
1.6.3
1 days
29
31
1.7
Device Procurement
32
1.7.1
3 days
30
33
1.7.2
2 days
32
25
23
27
Section
Task name
Duration
Predecessors
34
2.1
NAFIS Subsystem
35
2.1.1
Analysis
36
2.1.1.1
37
2.1.2
Design
38
2.1.2.1
1 days
39
2.1.2.2
3 days
38
40
2.1.2.3
3 days
39
2 days
10
36
Page 30
41
2.1.3.4
3 days
40
42
2.1.2.5
3 days
41
43
2.1.2.6
2 days
42
44
2.1.3
Implementation
45
2.1.3.1
20 days
46
2.1.3.2
3 days
45
47
2.1.3.3
5 days
46
48
2.1.3.4
3 days
47,45,46
49
2.1.4
Testing
50
2.1.4.1
Workload Testing
5 days
51
2.1.4.2
Security Testing
5 days
52
2.1.4.3
5 days
53
2.1.4.4
5 days
54
2.1.5
Increment Release
55
2.1.5.1
Acceptance Process
3 days
56
2.1.5.2
1 days
55
57
2.1.5.3
Increment Handover
1 days
56
58
2.1.5.4
Documentation Handover
1 days
56
37
44
49
Section
Task name
Duration
59
3.1
Fingerprint Module
60
3.1.1
Analysis
61
3.1.1.1
3 days
62
3.1.1.2
1 days
Predecessors
34
10
Page 31
63
3.1.1.3
1 days
40
64
3.1.1.4
3 days
65
3.1.2
Design
66
3.1.2.1
3 days
67
3.1.2.2
Design Database
2 days
66
68
3.1.2.3
2 days
67
69
3.1.2.4
2 days
68
70
3.1.2.5
2 days
69
71
3.1.2.6
3 days
70,67,68,69
72
3.1.3
Implementation
73
3.1.3.1
Create Database
3 days
67
74
3.1.3.2
15 days
73
75
3.1.3.3
3 days
74,73
76
3.1.3.4
3 days
74,73
77
3.1.4
Testing
78
3.1.4.1
Database Testing
5 days
79
3.1.4.2
5 days
80
3.1.4.3
Workload Testing
5 days
81
3.1.4.4
Security Testing
5 days
82
3.1.4.5
5 days
83
3.1.4.6
5 days
84
3.1.5
Increment Release
85
3.1.5.1
Acceptance Process
3 days
86
3.1.5.2
1 days
85
87
3.1.5.3
1 days
86
88
3.1.5.4
Documentation Handover
1 days
86
89
3.2
60
65
72
77
34
Page 32
90
3.2.1
Analysis
60
91
3.2.1.1
3 days
92
3.2.1.2
1 days
10
93
3.2.1.3
1 days
40
94
3.2.1.4
3 days
95
3.2.2
Design
96
3.2.2.1
3 days
97
3.2.2.2
Design Database
2 days
96
98
3.2.2.3
2 days
97
99
3.2.2.4
2 days
98
100
3.2.2.5
2 days
99
101
3.2.2.6
3 days
100,97,98,99
102
3.2.3
Implementation
103
3.2.3.1
Create Database
3 days
97
104
3.2.3.2
15 days
103
105
3.2.3.3
3 days
103,104
106
3.2.3.4
3 days
103,104
107
3.2.4
Testing
108
3.2.4.1
Database Testing
5 days
109
3.2.4.2
5 days
110
3.2.4.3
Workload Testing
5 days
111
3.2.4.4
Security Testing
5 days
112
3.2.4.5
5 days
113
3.2.4.6
5 days
114
3.2.5
Increment Release
115
3.2.5.1
Acceptance Process
90,65
95,72
102,77
107
3 days
Page 33
116
3.2.5.2
1 days
115
117
3.2.5.3
1 days
116
118
3.2.5.4
Documentation Handover
1 days
116
119
3.3
34
120
3.3.1
Analysis
90
121
3.3.1.1
3 days
122
3.3.1.2
1 days
10
123
3.3.1.3
1 days
40
124
3.3.1.4
3 days
125
3.3.2
Design
126
3.3.2.1
3 days
127
3.3.2.2
Design Database
2 days
126
128
3.3.2.3
2 days
127
129
3.3.2.4
2 days
128
130
3.3.2.5
2 days
129
131
3.3.2.6
3 days
127,128,129,130
132
3.3.3
Implementation
133
3.3.3.1
Create Database
3 days
127
134
3.3.3.2
15 days
133
135
3.3.3.3
3 days
133,134
136
3.3.3.4
3 days
133,134
137
3.3.4
Testing
138
3.3.4.1
Database Testing
5 days
139
3.3.4.2
5 days
140
3.3.4.3
Workload Testing
5 days
141
3.3.4.4
Security Testing
5 days
142
3.3.4.5
5 days
120,95
125,102
132,107
Page 34
143
3.3.4.6
5 days
144
3.3.5
Increment Release
145
3.3.5.1
Acceptance Process
3 days
146
3.3.5.2
1 days
145
147
3.3.5.3
1 days
146
148
3.3.5.4
Documentation Handover
1 days
146
149
3.4
34
150
3.4.1
Analysis
120
151
3.4.1.1
3 days
152
3.4.1.2
1 days
151
153
3.4.1.3
1 days
152
154
3.4.1.4
3 days
155
3.4.2
Design
156
3.4.2.1
3 days
157
3.4.2.2
Design Database
2 days
156
158
3.4.2.3
2 days
157
159
3.4.2.4
2 days
158
160
3.4.2.5
2 days
159
161
3.4.2.6
3 days
157,158,159,160
162
3.4.3
Implementation
163
3.4.3.1
Create Database
3 days
157
164
3.4.3.2
15 days
163
165
3.4.3.3
3 days
164,163
166
3.4.3.4
3 days
164,163
167
3.4.4
Testing
168
3.4.4.1
Database Testing
137
125,150
155,132
137,162
5 days
Page 35
169
3.4.4.2
5 days
170
3.4.4.3
Workload Testing
5 days
171
3.4.4.4
Security Testing
5 days
172
3.4.4.5
5 days
173
3.4.4.6
5 days
174
3.4.5
Increment Release
175
3.4.5.1
Acceptance Process
3 days
176
3.4.5.2
1 days
175
177
3.4.5.3
1 days
176
178
3.4.5.4
Documentation Handover
1 days
176
167
Section
Task name
Duration
Predecessors
179
4.1
180
4.1.1
Analysis
181
4.1.1.1
1 days
182
4.1.1.2
1 days
181
183
4.1.1.3
1 days
182
184
4.1.2
Design
185
4.1.2.1
3 days
186
4.1.2.2
3 days
187
4.1.3
Implementation
188
4.1.3.1
15 days
189
4.1.3.2
3 days
59,89,119,149
180
185
184
188
Page 36
190
4.1.3.3
191
4.1.4
Testing
192
4.1.4.1
5 days
193
4.1.4.2
5 days
194
4.1.4.3
5 days
195
4.1.5
Increment Release
196
4.1.5.1
Acceptance Process
3 days
197
4.1.5.2
1 days
196
198
4.1.5.3
1 days
197
199
4.1.5.4
Documentation Handover
1 days
197
200
4.2
59,89,119,149
201
4.2.1
Analysis
180
202
4.2.1.1
1 days
203
4.2.1.2
1 days
202
204
4.2.1.3
1 days
203
205
4.2.2
Design
206
4.2.2.1
3 days
207
4.2.2.2
3 days
208
4.2.3
Implementation
209
4.2.3.1
15 days
210
4.2.3.2
3 days
201
211
4.2.3.3
3 days
210
212
4.2.4
Testing
213
4.2.4.1
5 days
214
4.2.4.2
5 days
3 days
189
187
191
201,184
206
205,184
208,191
Page 37
215
4.2.4.3
5 days
216
4.2.5
Increment Release
217
4.2.5.1
Acceptance Process
3 days
218
4.2.5.2
1 days
217
219
4.2.5.3
1 days
218
220
4.2.5.4
Documentation Handover
1 days
218
221
4.3
Biometrics in a Box
59,89,119,149
222
4.3.1
Analysis
180
223
4.3.1.1
1 days
224
4.3.1.2
1 days
223
225
4.3.1.3
1 days
224
226
4.3.2
Design
227
4.3.2.1
5 days
228
4.3.2.2
3 days
227
229
4.3.2.3
3 days
228
230
4.3.3
Implementation
231
4.3.3.1
5 days
232
4.3.3.2
20 days
231
233
4.3.3.3
3 days
232
234
4.3.3.4
3 days
233
235
4.3.4
Testing
236
4.3.4.1
Database Testing
10 days
237
4.3.4.2
10 days
238
4.3.4.3
Workload Testing
10 days
239
4.3.4.4
10 days
212
222,205
226,208
212,230
Page 38
240
4.3.4.5
Security Testing
10 days
241
4.3.4.6
10 days
242
4.3.5
Increment Release
243
4.3.5.1
Acceptance Process
3 days
244
4.3.5.2
1 days
243
245
4.3.5.3
1 days
244
246
4.3.5.4
Documentation Handover
1 days
244
247
4.4
Mobile Application
59,89,119,149
248
4.4.1
Analysis
222
249
4.4.1.1
3 days
250
4.4.1.2
1 days
249
251
4.4.1.3
1 days
250
252
4.4.1.4
1 days
251
253
4.4.2
Design
254
4.4.2.1
5 days
255
4.4.2.2
3 days
254
256
4.4.2.3
3 days
255
257
4.4.3
Implementation
258
4.4.3.1
20 days
259
4.4.3.2
3 days
258
260
4.4.3.3
3 days
259
261
4.4.4
Testing
262
4.4.4.1
Workload Testing
5 days
263
4.4.4.2
5 days
264
4.4.4.3
Security Testing
5 days
265
4.4.4.4
5 days
235
248,226
253,230
257,235
Page 39
266
4.4.5
Increment Release
261
267
4.4.5.1
Acceptance Process
3 days
268
4.4.5.2
1 days
267
269
4.4.5.3
1 days
268
270
4.4.5.4
Documentation Handover
1 days
268
Duration
Predecessors
Section
Task name
271
5.1
System Handover
272
5.1.1
273
5.2
Project Review
274
5.2.1
Finalise Documentation
3 days
272
275
5.2.2
2 days
274
179,200,221,247
1 days
271
Page 40
4. Estimation
Revision History
Date
Ver.
Author
Addition/Alteration
10/09/2015
2.1
Benjamin Ivarsson
25/09/2015
2.1
David Ley
Changed Parts of 4.1 and finalised, Completed sections 4.2 and 4.3
16/10/2015
3.0
Benjamin Ivarsson
Page 41
4.2 Justification
4.2.1 Function Point Counting
ASS has chosen to make use of Function Point Counting, as it will give us the ability to
accurately estimate our software project, establish its complexity and size of the proposed
system, solely based on the requirements established in our scope. Function Point Counting
has been proven to be an extremely accurate and effective method to determine a meaningful
unit of measure that can be used to help in the estimation of the time and needed to complete a
software project.
As the technique is recognized by the ISO in ISO/IEC 20968:2002, as the standard best suited
for estimating time and cost on large-scale software projects, it will allow ASS to give CrimTrac
the best possible, worst possible and just right estimation of the project. Once the Function
Point Count has been calculated from analysing the functional requirements of the project, the
calculated result can then be estimated using the COCOMO II algorithmic software cost
estimation model, to then convert the result into meaningful metrics which can then be used as
a baseline to use for the time and approximate cost for our project.
Page 42
Page 43
4.3 Estimation
4.3.1 Software and Firmware Estimation
AUD $77,000.00
Optimistic
AUD $56,000.00
Pessimistic
AUD $98,000.00
AUD $274,200.00
Optimistic
AUD $156,000.00
Pessimistic
AUD $350,000.00
Page 44
Functionality
Type
Complexity
FP
FPC1
ILF
5 RETs
8 DETs
= Low Complexity
EI
5 FTRs
8 DETs
= High Complexity
EO
5 FTRs
8 DETs
= High Complexity
Page 45
FCP4
EIF
6 FTRs
8 DETs
= Average Complexity
FCP5
All records that are stored within the system will have the ability
to be searched, viewed, and extracted by all devices that are
connected to the system.
EQ
5 FTRs
8 DETs
= High Complexity
EQ
6 FTRs
17 DETs
= High Complexity
6 FTRs
8 DETs
6 Expected FTRs (Personal Details, Fingerprint Data, Palmprint
Data, Footprint Data, Facial Recognition Data, and Destination
= High Complexity
Page 46
Database)
8 Expected DETs (Uses same DETs from FCP1)
FCP8
EO
7 FTRs
16 DETs
= High Complexity
EI
5 FTRs
8 DETs
5 Expected FTRs (Personal Details, Fingerprint Data, Palmprint
Data, Footprint Data, and Facial Recognition Data)
= High Complexity
58
No.
Characteristic
Value
Comment
Data Communications
Page 47
Performance
Transaction Rate
Online Update
Complex Processing
10
Reusability
Page 48
11
Installation Case
12
Operational Case
13
Multiple Sites
14
Facilitate Change
56
Page 49
Page 50
5. Schedule
Revision History
Date
Ver.
Author
Addition/Alteration
22/09/2015
2.2
Brenton Millers
23/09/2015
2.2
Brenton Millers
24/09/2015
2.2
Brenton Millers
25/09/2015
2.2
Brenton Millers
16/10/2015
3.2
Brenton Millers
Both the GANTT Chart and Network Diagram are within the file called
NAFIS_Replacement_GANTT_CHART_Updated.mpp
This file must be opened within Microsoft Project.
PLEASE NOTE: As per conversation with Leigh-Ellen, the network diagram generated within
Microsoft Project is sufficient for submission.
Page 51
Page 52
Ver.
Author
Addition/Alteration
22.09.15
Sam OSullivan
15/10/2015
3.0
Benjamin Ivarsson
17/10/2015
3.0
Benjamin Ivarsson
16/10/2015
3.1
Brenton Millers
18/10/2015
3.1
Samantha OSullivan
Integrated Budget
18/10/2015
3.1
Samantha OSullivan
6.1 Budget
6.1.1 Planned Budget
6.1.1.1 Hardware Budget
The unit costs used for each hardware item was estimated from market research.
Item
Cost
Quantity
Total
$7900.00
$15,800.00
$7900.00
$15,800.00
$8600.00
$17,200.00
$9000.00
$18,000.00
$9900.00
$9,900.00
$76,700.00
Page 53
AUD $274,200.00
Optimistic
AUD $156,000.00
Pessimistic
AUD $350,000.00
AUD $50,000.00
Optimistic
AUD $32,700.00
Pessimistic
AUD $92,300.00
AUD $79,488.00
Optimistic
AUD $60,434.00
Pessimistic
AUD $98,040.00
Page 54
AUD $2,024,000.00
Optimistic
AUD $1,500,045.00
Pessimistic
AUD $4,546,091.00
Job Role
Single Salary
Subtotal
Senior Programmers
$120,000.00
$1,200,000.00
Junior Programmers
$80,000.00
$400,000.00
Senior Database
Administrator
$160,000.00
$400,000.00
Cryptographs
$60,000.00
$150,000.00
Project Manager
$252,000.00
$315000.00
Business Analyst
$90,000.00
$112,500.00
Page 55
Unit Cost
Quantity
Total
Hardware Procurement
11
$7,000.00
$77,000.00
Unit Cost
Quantity
Total
Software
11
$7,000.00
$77,000.00
Unit Cost
Quantity
Total
Miscellaneous Budget
11
$7,000.00
$77,000.00
$77,000.00
Page 56
Unit Cost
Quantity
Total
Installation Budget
11
$7,000.00
$77,000.00
Unit Cost
Quantity
Total
Training Budget
11
$7,000.00
$77,000.00
Unit Cost
Quantity
Total
11
$7,000.00
$77,000.00
Page 57
Item
Total
Hardware
See: 6.1.1.1 Hardware Budget
$77,000.00
Software
See: 6.1.1.2 Software Budget
$130,034.00
Miscellaneous
See: 6.1.1.3 Miscellaneous Budget
$29,167.34
Installation
See: 6.1.1.4 Installation Budget
$79,404.34
Training
See: 6.1.1.5 Training Budget
$1,345.022.67
$2,577,500.00
$4,238,128.35
Page 58
Page 59
6.2 Procurement
6.2.1 Planned Procurements
To fulfill the requirements of the project, ASS will be procuring hardware and software; hardware
will be sourced from contractors outside of the organisation, while all software and firmware will
be developed by ASS, ensuring the security of the project.
As the project will affect law enforcement agencies and organisations across all of Australia, the
contracted hardware vendors must be reputable companies who deliver safe, secure and
reliable components. It is critical that the necessary security for delivered hardware align with
the requirements of the project, as to not endanger the project.
ASS will procure the following for CrimTrac, with associated costs detailed in section 6.1
Hardware Procurement
Page 60
Software Procurement
NAFIS System
Web-Based UI
Fingerprint Module
Palmprint Module
Footprint Module
Facial Recognition Module
Biometrics in a Box
Mobile Application
Matching Algorithm
NAFIS Administration Console Software
Biometric Scanning Firmware (shipped with hardware)
Change Management Database
Contracted Work
Page 61
Page 62
If too many changes to the contract are required (baselined to 40% of the original contract, or as
determined by the Contract Manager), the contract will be cancelled and a new one can be
issued.
Any and all correspondence between contractors, vendors and ASS will be documented and
logged by the Contract Manager, archived in the Change Management Database. This ensures
a record of changes which can be obtained and tracked through the project development.
Page 63
Ver.
Author
Addition/Alteration
22/09/2015
2.1
Benjamin Ivarsson
22/09/2015
2.1
Benjamin Ivarsson
22/09/2015
2.1
Benjamin Ivarsson
22/09/2015
2.1
Benjamin Ivarsson
24/09/2015
2.1
Benjamin Ivarsson
16/10/2015
3.0
Benjamin Ivarsson
Went through revision for section 7.1-7.2; did not change the diagram.
Did not change change feasibility as it is elaborated upon in the audits
and reviews (section 7.1.3).
Change Request form was made and has been in the drive since start
of project; Brenton just forgot to upload it with the submission.
7.2 revised; couldnt find further phases established and no response
from Brenton about phases
For approaching changes in the project, ASS and CrimTrac will establish a joint Change
Advisory Board which will assess the necessity of a change and then approve or reject the
change. Any changes to the project will be logged by the Project Manager as either approved or
rejected.
To approach change of the project, any requests for changes from either the Project Team or
Direct Stakeholders has to be assessed by the Project Manager. If the Project Manager finds
the changes to be possible or necessary, the Project Manager will request approval Project
Sponsors and Change Advisory Board. The Project Manager acts as an intermediary between
ASS and Change Advisory Board. Changes has to follow by the change control hierarchy
structure below.
Page 64
If the Change Advisory Board approves or rejects a proposed change, the Project Manager will
go through the Change Control Procedure (7.1.2) to notify the initial change proposer.
Page 65
The Project Manager is required to review any submitted Change Request Forms (see attached
documents) as soon as possible for the change request to be available before each team
meeting. This is to assess whether the change is possible for the project team to implement
before the change is put forward to the Change Advisory Board.
If the project team detects any changes which needs to be made, these changes has to be
raised to the Project Managers attention at the next team meeting. The project manager has to
be immediately notified if any critical changes are made to the project.
Indirect stakeholders, such as users of the system, system testers and staff may put forward
feedback and suggestions to the project team for review.
Approved (Yes/No)
Decision date
Decision made by
Decision reason
Resulting Action
Page 66
Page 67
For this project, it is required of the Project Manager to hold continuous, weekly review meetings
with the Project Team. During these meetings, Team members will discuss the progress of the
project and review what has been done during the week. This will enable the Project Manager to
confirm with the Project Team that required functionalities are being implemented, and that the
project is developed according to the project scope.
When an increment has been completed, the Project Team will demonstrate how the developed
modules work for the Project Manager to establish full functionality according to project
requirements.
Additionally, the project progress has to be documented at each Team Meeting, and then added
into the project status report by the end of each meeting. This is to make sure that every
meeting is recorded and that variations from defined scope can be dated. By doing this, any
variations in increments can be dated to a set increment meeting, and can meet with
responsible Team members. By doing this, any anomalies in development can be corrected
before any critical errors affect the project.
Before each meeting, developed increments has to be internally tested by responsible
developers as well, so that they may be demonstrated in the weekly meeting. These tests has to
conform to the requirements of the project, and can only be assessed as complete by the
Project Manager and Change Advisory Board.
Page 68
Documents
ID
D1
Configuration Item
Project Charter/Project
Document Outline
Baselines
Version(s) 1.0, 2.0, 3.0
+
+
D2
D3
Project Estimation
Project Schedule
+
+
Project Budget
D6
D5
D4
Page 69
D7
Project Change
Management Plan
D8
Project Change
Request/Log Documents
User/Administration
Supporting Documents
D11
D10.A
D10
D9
D8.A
Page 70
user testing
D11.A
Reports
ID
R1
Configuration Item
Configuration Audits and
Reviews
Baselines
Version(s) 1.0, 2.0, 3.0
+
R2
R3
Implementation Success
Analysis
+
+
Configuration Item
HS1
Baselines
Version(s) 1.0, 2.0, 3.0
+
+
Page 71
Module Software/System
Components and Mobile
Applications
HS2
Hardware Configuration
HS2
Firmware
Contracts
ID
Configuration Item
C1
Tender Contract
Baselines
Version(s) 1.0, 2.0, 3.0
+
+
C2
C3
Subcontractor Contracts
CrimTrac Contracting
Agencies/Affiliates
C3.A
Page 72
Planning, Phase 1
Requires approval from Change Advisory Board;
any changes to contracted Agencies and
Affiliates requires re-establishing of contracts
Configuration items connected to this item
requires re-baselining and follow configuration
management regulations for affected items
Additionally, the Project Manager will be responsible for all project related configuration. The
Project manager also has to identify and monitor any configuration items, establish meetings
with the CCB, in accordance to section 7.1.
Any re-baselining is performed by the Project Manager, together with the responsible project
Page 73
team. This is to ensure that the baseline compliance remains cohesive through the project
increments.
Configuration Control
Identified configuration items (CIs) will be assigned with a unique ID and a CI name and be
stored by the configuration manager on provided CMDB. With each approved configuration
item, the individual(s) responsible for the change identification is recorded with the CI. The CI
will then be marked for change implementation.
Change requests follow the process in section 7.1 and shown in the section 7.1 diagrams. Any
request has to be verified, evaluated and reviewed. Reviewed changes are then passed to the
Change Advisory Board for approval; if approved the changes are then re-baselined and
implemented. This process is not necessary for low risk, in-scope and budget changes, where
the project manager has the authority to approve or reject the change based on the project
managers own judgement. The Project manager may decide to involve the project team
members in collaboration on the decision, however the project team has no power to rule on a
change. If the change request was submitted by a stakeholder they are required to be kept
informed on the change request submission and outcome.
Medium- to High-risk changes needs prior approval from the CCB and CAB before any change
can be implemented. The CCB and CAB will evaluate whether the change is feasible, and if
approved the corresponding CI will be re-baselined before it is implemented. Stakeholders
impacted by evaluation and review, or whom submitted the change request of Medium- to Highrisk CIs is required to be notified and informed about the change request outcome.
The provided CMDB will have three distinct storages which are organized into Documents,
Reports and Contracts. These storages may be accessed by the Configuration Manager, the
Project Manager and the Project Team. The access is limited to read/write access to ensure
Page 74
those which have the correct authority or permissions can access the storage. The system is
shown in below diagram.
Configuration management will perform audits at all medium- to high-risk project changes as
well as project critical points. The configuration manager will be responsible for these processes
and the outcome of these processes being consistent with the project constraints. Additionally,
the configuration manager will be responsible for the verification and auditing process to
determine whether the project activities shall continue.
Page 75
Ensure CI version are correctly numbered and correct version control is in place
Analyze previous versions of documents and software
Comparison of current versions to expected results and success criteria
Report information and results from the auditing process
For each review, two audits can be performed; a Functional and a Physical Configuration Audit
(FCA and PCA respectively). Both audits are required to be provided for the appropriate
involved stakeholders.
Page 76
Ver.
Author
Addition/Alteration
15/10/2015
3.1
15/10/2015
3.1
Samantha OSullivan
15/102015
3.1
David Ley
18/10/2015
3.1
David Ley
18/10/2015
3.1
Samantha OSullivan
Risk Identification
18/10/2015
3.1
Samantha OSullivan
18/10/2015
3.1
Samantha OSullivan
Addressing Risks
18/10/2015
3.1
Samantha OSullivan
Risk Assessment
18/10/2015
3.1
Samantha OSullivan
18/10/2015
3.1
Samantha OSullivan
18/102015
3.1
David Ley
Risk Classification
18/102015
3.1
David Ley
18/102015
3.1
David Ley
Top 10 Risks
18/102015
3.1
David Ley
Risk Scheduling
Page 77
information gathering and SWOT analysis alongside the risk register. This will ensure that the
risks are identified quickly and continuously ensure a comprehensive identification of the risks,
in conjunction with this process a mitigation plan will need to be developed in the event of error.
Documentation Review
- The overall planning documentation will be reviewed by the project manager at
the end of the planning phase, after the project manager has checked the
documentation any subsequent updates or modifications are made. This gives
the leader a great indicator of the risks involved in the project and the technical
risks and any risks that may affect the budget or timing constraints. Major
technical risks include the old system crashing when the integration of the new
system with the old system. For preventative measures this project will use
multiple techniques.
SWOT Analysis
- The SWOT analysis is performed late in the planning phase of the project when
the specifications of the project is known. A collaboration will be done to identify
the strengths and weaknesses, opportunities and the threats to the project. With
this information being available it allows the team to use the strengths and
opportunities. To ensure steps are taken to rectify the weaknesses and prevent
threats.
- Information Gathering
This technique is revolved around four sub-techniques including the Delphi technique,
brainstorming, interviewing and root cause analysis.
- Brainstorming will be used to develop a list of possible errors that may occur with
a risks analysis: with the assistance of team members. This will allow the team to
produce a comprehensive list before the development stage of the project
begins.
- The Delphi technique is where ideas about the project can be raised
anonymously from all areas of the project through questionnaires. Once all
functionality and the requirements of the system are known through the
technique the project team members will be able to analyze for specifications in
detail. This should allow for a greater risk identification as team members and
stakeholders are able to comment on the risks anonymously: this will full honesty
and a detailed critical analysis of any potential errors that the project could face.
- Interviews: A team member will talk to the project stakeholders to determine what
they believe the risks that may encounter. This interviewing technique will also
allow for a direct discussion with related parties about the project and a more
engaged and comprehensive discussion of possible threats and issues. With
development well under way there will be a greater understanding for the project
and the project team.
Page 78
Security
Ease of Use
Hardware
Software
Budgetary
Administerial/Managerial
Disaster
Information Technology
Financial Management
Communications
Business Process
HR Management
Legal
Privacy
Resource Management
Other/Miscellaneous
Page 79
The risks will be placed into a register and there will be respective risk categories. In order to
perform qualitative risk analysis, the following methods will need to utilised. The impact
assessment method to determine what priority to allocate resources to mitigate risks, probability
of occurrence, impact, time-frame and the causes of risks. The matrix is than used to visually
display and analyse risk information as demonstrated below on the classification accordance to
this scale.
Probability/Impact Matrix Diagram
The data quality assessment method is performed to the quality of the information held in
relation to risks and how the information can be helpful, accurate and reliable. The classification
and categorisation of the risks refer back to four areas. Risk source which identifies the source
of the root. The root causes seeks to find and assess the underlying cause of the risk. The
project phase refers to the project alongside the testing. The last section of the project area is
affected to the aspect of the project that is affected (project scope). The most important risk
management technique is the risk urgency assessment method that identifies which risks are
most important with their indicators and the risks in the risk register.
Page 80
To achieve these outputs you can use a variety of different methods, these include:
Data Gathering and Representation Techniques: these include interviewing and using
expert judgement
Expected Monetary Value Analysis: this method is a statistical concept that calculates
the average outcome when the future includes scenarios of things that may or may not
happen.
Cost Risks
Communication,
understanding the goals from
the stakeholders.
Schedule Risks
Page 81
Positive risks are those in which are beneficial to the project and project's objectives.
Acceptance can also be used as a method in this technique. Positive risks will either be
shared or enhanced. It is beneficial to the organisation that sharing any positives risks to
a third party who is able to make sure the risk will benefit the organisation in some way.
It enhances the capitalisation on the key factors that will influence the positive risk. This
method ultimately depends on the risk and situation of the team's capabilities.
Contingent Response Strategies are predeveloped tasks for specific risks and situations
also referred to as backup plan. The risks under this header are carefully monitored and
these strategies are only executed under specific predefined conditions. This technique
is only used for majorly unstable and highly complex risks that would not be served well
by the positive factor. The project manager is the only person who will be able to make
an assessment of the risk to determine whether a contingent response is required.
Generally, if it has a high impact on the matrix, there will be a contingent response
developed.
Unidentified risks that are yet to impact the project: These risks are discovered at a
later date than the risks that are identified in the Risk Register. These risks need to be
fully explored as what effect they have on the project, how they will be dealt with, and
the probability of them occurring. Once this has been achieved the newly identified risks
must added to the Risk Register as to ensure that is kept up to date.
Unidentified risks that have already impacted the project: These risks are the most
important to minimise any potential effect they have on the project. Steps must be taken
immediately to ensure they are properly identified and then dealt with, with as little
impact onto the project as possible. If this were to occur the Project Manager would
seek the assistance of senior Project Team members in order to deal with the
unidentified risk by allocating as many resources as needed in order to mitigate the
unidentified risk as much as possible. Methods to achieve this include brainstorming, as
it allows for the quick realisation of ideas to alleviate the risks impact on the project.
Once a plan of action has been identified it can then be implemented as quickly as
Page 82
possible to solve the problem. After this has occurred the Project Manager can then
formal identify the risk and then enter its details into the Risk Register.
ID
Rank
Event or
Risk
Risk
Taxonomy
Threat
or
Opportunity
Probability
Impact
Score
(P x I)
Risk
Strategy
Status
R11
Key
Stakeholders
are not
Communic
ations
Threat
10
50
Risk
Avoidance
Active
High
Page 83
impressed with
systems
performance
Priority
R7
Requirements
change during
development
Communic
ations
Threat
40
Risk
Mitigation
Active
High
Priority
R16
System servers
are hacked
Security
Threat
10
40
Risk
Avoidance
Active
R10
The security of
the system data Security
is not secure
Threat
36
Risk
Mitigation
Active
R23
Loss or
corruption of
project files
Software
Threat
10
30
Risk
Avoidance
Active
Government
body makes
changes to
legislation
regarding the
storing of
biometric data
Privacy
Threat
10
30
Risk
Acceptanc
e
Active
Project goes
over budget
during
development
Budgetary
Threat
28
Risk
Mitigation
External
devices
connected to
the system
arent updating
data
Information
Technolog Threat
y
24
Risk
Mitigation
Active
R13
External
devices
connected to
the system
arent
downloading
data
Information
Technolog Threat
y
24
Risk
Mitigation
Active
R1
10
The project
breaks a time
constraint and
Business
Process
21
Risk
Mitigation
Active
R25
R26
R12
Threat
Active
Page 84
Review Frequency
Probability/Impact Matrix
Page 85
Risk Register
Page 86
Rank
Event or Risk
Risk Taxonomy
Threat
or
Opportunity
10
The project
breaks a time
constraint and is
not ready for the
implementation
on the due date.
Business
Process
Threat
21
Risk
Mitigation
Active
R2
16
Current system
crashes whilst
implementing
the new system
Information
Technology
Threat
12
Risk
Avoidance
Not
Active
R3
18
Users do not
engage with the
system
HR Management Threat
Risk
Mitigation
Not
Active
R4
11
If the hardware
is of poor quality
Hardware
Threat
21
Risk
Mitigation
Active
22
If the hardware
components are
faster than
expected
Hardware
Opportunity
24
Risk
Exploitation
Not
Active
R6
19
System
maintenance
interferes with
schedule of
implementation
Software
Threat
Risk
Avoidance
Not
Active
R7
Requirements
change during
development
Communications
Threat
40
Risk
Mitigation
Active
High
Priority
ID
R1
R5
Probability
Impact
Score
(P x I)
Risk
Strategy
Status
Page 87
12
Database
doesnt store
information
correctly
Information
Technology
Threat
21
Risk
Mitigation
Active
R9
13
The system
suffers from
constant
crashes due to
code defects
Software
Threat
10
20
Risk
Mitigation
Active
R10
The security of
the system data
is not secure
Security
Threat
36
Risk
Mitigation
Active
Key
Stakeholders
are not
impressed with
systems
performance
Communications
Threat
10
50
Risk
Avoidance
Active
High
Priority
External devices
connected to the Information
system arent
Technology
updating data
Threat
24
Risk
Mitigation
Active
External devices
connected to the Information
system arent
Technology
downloading
data
Threat
24
Risk
Mitigation
Active
23
No internet
connection for
external devices
to connect to
Information
Technology
Threat
27
Risk
Acceptance
Not
Active
R15
14
Supplied
biometric data
incorrectly
matched to
database
biometric data
Software
Threat
10
20
Risk
Mitigation
Active
R16
System servers
are hacked
Security
Threat
10
40
Risk
Avoidance
Active
R17
15
Threat
16
Risk
Mitigation
Active
R8
R11
R12
R13
R14
Page 88
24
Network
coverage not
able to transmit
data to and from
central servers
efficiently
enough
Information
Technology
Threat
27
Risk
Acceptance
Active
R19
25
Interference
from electrical
storms slowing
down data
transfer
Information
Technology
Threat
27
Risk
Acceptance
Active
R20
20
Project team
member get
pregnant
HR Management Threat
Risk
Acceptance
Not
Active
R21
21
Project team
member
diagnosed with
terminal illness
HR Management Threat
Risk
Acceptance
Not
Active
R22
26
Project team
member catches HR Management Threat
debilitating cold
25
Risk
Mitigation
Active
R23
Loss or
corruption of
project files
Software
Threat
10
30
Risk
Avoidance
Active
R24
17
Client goes
bankrupt
Legal
Threat
10
10
Risk
Acceptance
Not
Active
Government
body makes
changes to
legislation
regarding the
storing of
biometric data
Privacy
Threat
10
30
Risk
Acceptance
Active
R26
Project goes
over budget
during
development
Budgetary
Threat
28
Risk
Mitigation
R27
27
Disaster
Threat
10
10
Risk
Acceptance
R18
R25
Page 89
Active
Not
Active
R28
28
Zombie
Apocalypse
Disaster
Threat
10
10
Risk
Mitigation
Not
Active
R29
29
Information
Technology
Threat
Risk
Acceptance
Not
Active
30
Brenton
accidentally
overrides all
project data with
Taylor Swift
songs
Information
Technology
Threat
10
10
Risk
Avoidance
Active
HR Management Threat
10
10
Risk
Acceptance
Active
R30
R31
31
Team-member
ruptures
something
(again) and has
to defer
Page 90
Ver.
Author
Addition/Alteration
12/08/2015
1.1
Benjamin Ivarsson
14/08/2015
1.1
Benjamin Ivarsson
16/08/2015
1.1
Benjamin Ivarsson
28/08/2015
1.2
Benjamin Ivarsson
21/09/2015
2.1
Benjamin Ivarsson
15/10/2015
3.1
Benjamin Ivarsson
18/10/2015
3.2
Benjamin Ivarsson
Revised 9.1
9.2, Project Achievements
17/10/2015
3.2
Brenton Millers
18/10/2015
3.2
Brenton Millers
Page 91
Page 92
Success Criterias
Criteria Met
Discussion
A team average of a GP
6(>80% mark) or above on
Workbook 1; Individual
scores reaching a 6 GPA.
Team Excelling in
Submission, receiving a GPA
of 7(>90%).
N/A
Page 93
Workbook 2
Success Criterias
Criteria Met
Discussion
N/A
Individual GP of 7(>90%)
achieved.
Familiarity with tools
discussed for workbook 2
(Scope Management,
Estimation, Time
Management, Integration
Management, Change
Management) modules.
Correctly applied the tools for
the submission of workbook
2.
Page 94
Workbook 3
Success Criterias
Criteria Met
Discussion
A team average of a GP
6(>80% mark) or above on
Workbook 3; Individual
scores reaching a 6GPA.
TBA
TBA
TBA
TBA
Page 95
Deadline
Time Spent
Agenda
Discussion
Everything delivered
on time, as we stuck to
the set deadlines and
schedule.
On Mondays we talk
and discuss what work
we did the week
before, how we can
improve on the work
weve put in towards
the assignment and
what weve learnt.
Workbook delivered
end of Week 5 - 30th of
August
On Wednesdays, we
apply what weve learnt
and work cooperatively
to improve and write
each section of the
deliverable, while
setting deadlines for
our next development
sprint of the
assignment.
Days between these
meetings, we work
individually in a shared
Google Document,
where the assignment
is incrementally added
to.
Workbook 2
Workbook 1
Completely
Revised, 5%
Section 3
(WBS)
complete,
30%
Section 4,
Estimation is
complete,
technique
stated and
justified, 30%
Week 9 - September
25th
Same agenda as
above with some
modifications.
Due to increased
intensity of project
deliverables, meetings
has been rescheduled
to near every evening
of the week.
For Workbook 2, we
scheduled more
meetings, but as it
started interfering with
individual members
work schedules, we
were never a full team
present.
Samantha also had to
undergo surgery for
her tonsils, and as
such, her tasks were
deferred to workbook 3
Page 96
Section 5,
Schedule is
complete
and
consistent
with WBS,
20%
Section 7 is
complete
with attached
forms, 10%
Section 10 is
complete,
timesheets
and task
allocations
fulfilled, 5%
Workbook 3
Section 6,
Budget and
Procurement
complete,
20%
Section 8,
Risk
Assessment,
complete,
20%
Section 9,
Project
Review,
complete,
20%
Section 10,
Project
Management
, complete,
20%
All revisions
from
Workbook 1
and 2
complete,
20%
submission.
Week 11 - October
18th
Team worked
independently during
the weeks leading up
to the submission,
having just come out of
a university holiday
and everyone having
other assignments to
do.
Team met on Sunday,
18th of October to
review the assignment
before submission.
Page 97
Page 98
only knew vaguely the types of work that have to be undertaken for a project to succeed, but
have since been shown that there is a lot of different aspects to managing a project, from
ensuring that all requirements are outlined correctly and contain all of the needed elements of
the clients needs, to how estimation is much needed skill in the world of IT to ensure that
projects dont blow out their budget or time schedule, to even seeing how potential risks can be
analysed, categorised, and then prioritised to ensure that they dont affect the project, and if
they do the impact is limited. I started this course knowing that the area i wanted to most work
in was Project Management, and having completed this assignment, and (hopefully) the course
my goal for my career has not changed at all. In fact it has only strengthened my resolve to
strive for this career choice, as I feel that I would really enjoy the fast pace that is the
management of projects. There were hard times during the development of this assignment but
as a group we pushed through them and still remain friends at the end of the process (a rarity i
have been told). In conclusion I would recommend this course to anyone who would like to see
how a software project team has to perform in the real world, and produce a finished product to
a customer.
Sam: During this course I have learnt many tools that will be helpful in the industry and has
helped me grow in my area of study. I found being sick for a lot of the semester hard to keep up
with course content. The project management side of things has really made me consider a lot
of time management not with just university but work as well.I also had the problem of working
and it made things extremely difficult when not knowing my shifts. Although these issues
wouldn't be a problem in the real world it was because we all had other commitments. This
semester and this subject have ideally made me decide on what i am interested in doing for a
career. I also feel like I have gained more information and gathered an understand on how
things like project management work in the industry.
Brenton: As the project manager of this project I have learnt quite a lot. Trying to manage 3
other people with different commitments has taught me how to manage the short amount of time
we had as a group. It has also taught me conflict resolution regarding timetabling. Other than
that, task allocation was done based around the strengths of the group members and their
confidence in their abilities to do said sections. Nothing was ever forced upon anyone.
Lessons I have learnt regarding this assignment is to make sure you read the module books
before attempting the section. I had to redo a large chunk of WBS because we didn't
understand how to make a tree diagram based on our SDLC. This took 3 Meetings to fix with
Leigh-Ellen.
The group meetings for me worked quite well. It allowed all the group members to make sure
they were always on the same page. It also allowed for more discussion regarding topics as
there are 4 minds on the same task vs one when working individually. This unfortunately
towards the end became too difficult to organise with everyone having work commitments.
Page 99
The only thing I can pick at, that didnt work particularly well was google docs. The website is
particularly painful to use, it lacks features and has compatibility issues when printing to pdf.
The use of google drive however was fantastic.
There was not a section in this assignment that I didnt learn something from. In particular,
creating the WBS was quite a challenge. Additionally deconstructing the requirements from the
tender was quite a challenge. The things I have learnt will help me come the end of the year
with the startup of my company. It will also come in handy with Industry Project next year.
I would gladly do this whole assignment again. The content is great and well written, and with
the support of two fantastic staff members (Leigh-Ellen and Lewis) it makes the subject really
enjoyable. My hat is off to both of you and I appreciate all the time and help you have provided
me throughout the semester.
For my next assignment I will take the lessons I have learnt and apply them. The group
meetings works really well and I will be using them again. I also wont have as much work
commitments next project/assignment, That was killer.
Page
100
Ver.
Author
Addition/Alteration
15/09/2015
2.1
Benjamin Ivarsson
15/09/2015
3.0
Benjamin Ivarsson
Page
101
individual meetings for the final submission to run through and review the document before
submission.
Overall, the project development for workbook 1 progressed on track, with progress being made
iteratively each week.
Changes proposed for next workbook are mostly related to time management and meeting
schedules. For each meeting, suggestions of an agenda has been put forward, so that
discussed topics can be documented for future re-evaluation. Team works well together and
each member agree with the goals set forward for the project.
10.1.2 Workbook 2
Initial week for workbook 2, no meetings were had due to entire team being indisposed for
individual reasons (sickness, work obligations, home issues, travel etc.). However, the team ( Samantha OSullivan due to surgery) met for a tutorial meeting to get an understanding of
proper estimation techniques. Discussions were also initiated about changing the weekly
meeting times, so to allow for more work being done.
During the second week, task list was updated for the team by Brenton Millers and David Ley,
so that individual work could be drafted for the next team meeting and then iterated upon.
Benjamin Ivarsson and Samantha OSullivan were both unavailable for the team meetings due
to work obligations and health concerns respectively. Team members met up again on
Thursday for brief discussion about new task allocations and establishing a method of schedule
estimation (with Gantt chart practice). Following this meeting, Benjamin Ivarsson completed his
sections fully by 22/09/2015, but didnt receive approval on his work by the project manager
(Brenton).
Throughout the submission for workbook 2, team members were scattered and few meetings
were had until the final submission week. No sections were really being done on time, and as
such, the team struggled to catch up. Towards and during the final week before submission,
meetings were had every night up until submission date to attempt and complete the workbook
on time.
A lot of the difficulties in delivering on time can be attributed to the work breakdown structure
section which was tasked to Brenton Millers, and as such David Ley struggled completing his
sections on time. Much of the delayed work also derived of Samantha OSullivan having surgery
for tonsillitis. However, the team collaborated and worked hard up until the submission date to
finalize their sections and make up for lost time. Due to Samanthas tonsillitis, she has opted out
from the final submission, having been unable to deliver her assigned sections. She has also
provided medical certificates for this.
Page
102
10.1.3 Workbook 3
Coming into this assignment at the beginning of a university holiday, followed by two weeks of
additional work, the development of workbook 3 slowed down drastically. An increased
workload for all members of the team in separate areas has drained the team of available
timeslots to collectively work on the final submission.
Instead, it was put off by all involved until the final weekend for submission. However, the
motivation of the team didnt decline; I, Benjamin, am not able to discern whether this motivation
came from stress to meet a deadline, or from actual dedication and ambition to produce a high
quality assignment. Id like to think that it was a good blend.
Thursday night, Samantha and David met up and finished their assigned sections; by Friday
night, Benjamin had his sections complete so that Brenton Millers could finish his section. Team
could use the approval of each other on sections and help proof reading/discussing, but with the
end of a semester and an increase in finishing assignments on a nested due-date, less
constructive criticism between the team-members was available. This came to show the value
of a well-established communication strategy, which we shouldve stuck to.
Towards the final submission, each member of the team were independently working on their
tasked sections, as to complete the third workbook before it was due.
Page
103
Allocated To
Due
Date
Status
Brenton Millers
10/08/2015
Done
Document Template
Setup
Brenton Millers
10/08/2015
Done
Brenton Millers
12/08/2015
Done
1.1 Company
Information
Team meeting
30/08/2015
Done
1.1.2 Project
Description
Benjamin Ivarsson
30/08/2015
Done
Benjamin Ivarsson
30/08/2015
Done
1.1.4 Approach
David Ley
30/08/2015
Done
1.1.5 Primary
Stakeholders
Samantha OSullivan
30/08/2015
Done
Benjamin Ivarsson
30/08/2015
Done
1.1.7 Budget
Brenton Millers
30/08/2015
Done
1.2 Stakeholder
Analysis
Samantha OSullivan
30/08/2015
Done
Page
104
1.3 Communication
Strategy (Table)
David Ley
30/08/2015
Done
Samantha OSullivan
30/08/2015
Done
1.3.2 Team
Communication
Strategies
Samantha OSullivan
30/08/2015
Done
1.3.3 Communicating
Amongst A Distributed
Team
Samantha OSullivan
30/08/2015
Done
Brenton Millers
30/08/2015
Done
Brenton Millers
30/08/2015
Done
2.3 Product
Deliverables
Brenton Millers
30/08/2015
Done
David Ley
30/08/2015
Done
David Ley
30/08/2015
Done
Benjamin Ivarsson
30/08/2015
Done
Benjamin Ivarsson
30/08/2015
Done
Task
Allocated To
Due
Date
Status
David Ley/Brenton
Millers
11/09/2015
Done
Brenton Millers
15/09/2015
Done
Submission 2
Page
105
4.1 Choice of
Technique
Benjamin
Ivarsson/David Ley
15/09/2015
Done
4.2 Justification
David Ley
15/09/2015
Done
4.3 Estimation
David Ley
18/09/2015
Done
5.0 Schedule
Brenton Millers
23/09/2015
Done
Samantha
OSullivan/Brenton
Millers
25/09/2015
Done
6.1.2 Cost
Management
Samantha
OSullivan/Brenton
Millers
25/09/2015
Done
Benjamin Ivarsson
25/09/2015
Done
Benjamin Ivarsson
25/09/2015
Done
Brenton
Millers/Benjamin
Ivarsson
25/09/2015
Done
7.2.1 Configuration
Items
Brenton
Millers/Benjamin
Ivarsson
25/09/2015
Done
7.2.2 Configuration
Management System
Brenton
Millers/Benjamin
Ivarsson
25/09/2015
Done
Benjamin Ivarsson
15/09/2015
Done
Benjamin Ivarsson
15/09/2015
Done
Workbook 1 Revision
Section 1.1
Section 1.2
Section 1.3
Section 2
Section 3
Section 9
Section 10.1
Team Collaboration
25/09/2015
Done
Page
106
Submission 3
Task
Allocated To
Due
Date
Status
6.2.1 Planned
Procurement
Brenton
Millers/Benjamin
Ivarsson
18/10/2015
Done
6.2.2 Procurement
Management
Brenton
Millers/Benjamin
Ivarsson
18/10/2015
Done
David Ley/Samantha
OSullivan
18/10/2015
Done
David Ley/Samantha
OSullivan
18/10/2015
Done
David Ley/Samantha
OSullivan
18/10/2015
Done
Benjamin Ivarsson
15/10/2015
Done
9.2 Project
Achievements
Benjamin Ivarsson
18/10/2015
Done
Benjamin Ivarsson
15/10/2015
Done
All
18/10/2015
Done
All
18/10/2015
Done
Page
107
Benjamin Ivarsson
15/10/2015
Done
Brenton Millers
4/10/2015
Done
10.3 Timesheets
All
18/10/2015
Done
Workbook 2 revision
All
16/10/2015
Done
Page
108
10.3 TimeSheets
Each member of the team should complete a timesheet showing their work for the workbook.
This should build progressively across the entire semester. Add more rows as required
Name: Benjamin Ivarsson s2909727
Date:
Time Spent
Task
Comments
10/08/2015
3 Hours (6-9pm)
Section 1; Team
collaboration, project charter
outlined and worked out
through group discussion and
added onto iteratively.
12/08/2015
1 Hour (7-8pm)
14/08/2015
2 hours (6-8pm).
16/08/2015
2 hours (10am-12pm)
Worked on Approach; to be
rewritten after team
discussions
Team discussions on
Approach
28/08/2015
30/08/2015
2 hours (12am-2am)
Page
109
submission.
Readjusted Tables.
Clarified details.
Worked an additional hour on
fixing sections which Brenton
identified needed fixing.
30/08/2015
1 hours(12pm-1.30pm)
N/A
10/09/2015
3 hours (8pm-11pm)
14/09/2015
21/09/2015
1 hour (7pm-8pm)
22/09/2015
2 hours (10am-12.30pm)
Lunchbreak at 12.30
22/09/2015
3 hours (1pm-4pm)
3 hours (9pm-12am)
24/09/2015
12 hours (12pm-12.30am)
Re-wrote Section 7.
Revised previous document
version.
Established baselining.
Mocked up a theoretical
CMDB.
25/09/2015
59 minutes (11pm-11.59pm)
15/10/2015
Page
110
obvious flaws)
16/10/2015
18/10/2015
4 hours (9pm-1.30am)
6 hours (10am-4pm )
Time Spent
Task
Comments
10/08/2015
4 Hours (6-10pm)
Group Meeting
12/08/2015
3 Hours (6:30-9:30pm)
Group Meeting
17/08/2015
4 Hours (6-10pm)
Group Meeting
19/08/2015
4 Hours (6-10pm)
Group Meeting
20/08/2015
Note taking
21/08/2015
22/08/2015
3 Hours (7pm-10pm)
Note taking
23/08/2015
4 Hours (6 - 10pm)
Section 2.2
Page
111
3 Hours (6-9pm)
Group Meeting
26/08/2015
3 Hours (6-9pm)
Group Meeting
27/08/2015
2 Hours (8-10pm)
Section 2.2
28/08/2015
6 Hours (1-5:30pm)
29/08/2015
12 Hours(1pm-1am)
Section 2
30/08/2015
07/09/2015
4 Hours (6-10pm)
09/09/2015
4 Hours (6-10pm)
14/09/2015
3 Hours (7-10pm)
20/09/2015
5 Hours (9-2pm)
WBS table.
21/09/2015
6 Hours (3-9pm)
WBS table.
22/09/2015
3 Hours (12-3pm)
WBS table.
23/09/2015
12 Hours (12pm-12am)
24/09/2015
13 Hours (11am-12am)
25/09/2015
13 Hours (11am-12am)
Page
112
15/10/2015
30 Mins (2-2:30pm)
16/10/2015
2 Hours (4-6pm)
17/10/2015
4 Hours (2-6pm)
Procurement Section
18/10/2015
7 Hours (4-11pm)
Time Spent
Task
Comments
10/08/2015
4 Hours (6-10pm)
Group Meeting
10/08/2015
4 Hours (6-10pm)
Worked on 1.1
12/08/2015
4 Hours (6-10pm)
Group Meeting
14/08/2015
3 Hours (6.30-9.30pm)
17/08/2015
4 Hours (6-10pm)
Group Meeting
17/08/2015
4 Hours (6-10pm)
19/082015
4 Hours (6-10pm)
Group Meeting
19/08/2015
4 Hours (6-10pm)
24/08/2015
4 Hours (6-10pm)
Group Meeting
Page
113
4 Hours (6-10pm))
Continued outlining
stakeholders various ways of
communication between
project team members.
26/08/2015
4 Hours (6-10pm)
Group Meeting
26/08/2015
4 Hours (6-10pm)
2 Hours (7-9am)
30/8/2015
4 Hours
07/09/2015
4 Hours (6-10pm)
09/09/2015
4 Hours (6-10pm)
14/09/2015
3 Hours (7-10pm)
16/09/2015
4 Hours (6-10pm)
21/09/2015
4 Hours (6-10pm)
22/092015
4 Hours (6-10pm)
24/092015
4 Hours (6-10pm)
25/092015
9 Hours (3-12)
Estimation Section 4
Finalised Section 3.1
Group Meeting
15/10/2015
2 Hours
Group Meeting
Page
114
6 Hours
Time Spent
Task
Comments
10/08/2015
4 Hours (6-10pm)
Section 1; Team
collaboration, project charter
outlined and worked out
through group discussion and
added onto iteratively.
12/08/2015
2 Hours (6:30-8:30pm)
Group Meeting
17/08/2015
4 Hours (6-10pm)
Group Meeting
24/08/2015
4 Hours (6-10pm)
Group Meeting
26/08/2015
4 Hours (6-10pm)
Group Meeting
27/08/2015
5 Hours (1am-6am)
Individual Work
Worked on Stakeholder
Analysis
28/08/2015
3 Hours (9pm-12am)
Individual Work
Worked on Communication
Strategy
29/08/2015
3 Hours (2pm-5pm)
Individual Work
30/08/2015
Page
115
9 Hours (3-12)
Estimation Section 4
Finalised Section 3.1
Group Meeting
30/09/2015
Budget
31/09/2015
Budget
15/10/2015
2 Hours
Group Meeting
18/10/2015
6 Hours
18/10/2015
2 Hours
Integrated Budget to
document
18/10/2015
3 Hours
18/10/2015
2 Hours
11. Appendixes
Revision History
Date
Ver.
Author
Addition/Alteration
15/10/2015
3.1
Benjamin Ivarsson
Page
116
This Project Change Request form has to be completed for requesting changes to
approved requirements of Ace System Solutions original Project Plan. This for is
assessed by Ace System Solutions Project Manager.
Please attach any supporting documentation which will be helpful to the approval
process. Form is submitted to Ace System Solutions Project Manager, to be reviewed
by the affected Project Team.
1. PROJECT DETAILS
Name of Project
Project Identification #
2.
REQUEST DETAILS
Request No.
Date of Request
Name of Requestor
Position/Role
Page
117
3.
CHANGE DETAILS
Project Category
Proposed Change
Scope
Time
Cost
Quality
Risk Management
Communications
Other
4.
CHANGE JUSTIFICATION
Priority
Immediate
Essential
Urgent
High
Medium
Low
Intended outcome(s)
Expected benefit(s)
5.
IMPACT OF CHANGE
6. SUPPORTING DOCUMENTATION
Page
118