.
Чтение книги онлайн.
Читать онлайн книгу - страница 2
There are two ways in which you can choose to interpret this statement;
1.how aware are you that the answer to the question is clearly defined
2.for more in-depth analysis you can choose to gather evidence and confirm the answer to the question. This obviously will take more time, most Self-Assessment users opt for the first way to interpret the question and dig deeper later on based on the outcome of the overall Self-Assessment.
A score of ‘1’ would mean that the answer is not clear at all, where a ‘5’ would mean the answer is crystal clear and defined. Leave emtpy when the question is not applicable or you don’t want to answer it, you can skip it without affecting your score. Write your score in the space provided.
After you have responded to all the appropriate statements in each section, compute your average score for that section, using the formula provided, and round to the nearest tenth. Then transfer to the corresponding spoke in the System Protection Scorecard on the second next page of the Self-Assessment.
Your completed System Protection Scorecard will give you a clear presentation of which System Protection areas need attention.
System Protection
Scorecard Example
Example of how the finalized Scorecard can look like:
System Protection
Scorecard
Your Scores:
BEGINNING OF THE
SELF-ASSESSMENT:
Table of Contents
About The Art of Service7
Included Resources - how to access7
Purpose of this Self-Assessment9
How to use the Self-Assessment10
System Protection
Scorecard Example12
System Protection
Scorecard13
BEGINNING OF THE
SELF-ASSESSMENT:14
CRITERION #1: RECOGNIZE15
CRITERION #2: DEFINE:27
CRITERION #3: MEASURE:43
CRITERION #4: ANALYZE:58
CRITERION #5: IMPROVE:73
CRITERION #6: CONTROL:89
CRITERION #7: SUSTAIN:101
System Protection and Managing Projects, Criteria for Project Managers:126
1.0 Initiating Process Group: System Protection127
1.1 Project Charter: System Protection129
1.2 Stakeholder Register: System Protection131
1.3 Stakeholder Analysis Matrix: System Protection132
2.0 Planning Process Group: System Protection134
2.1 Project Management Plan: System Protection136
2.2 Scope Management Plan: System Protection138
2.3 Requirements Management Plan: System Protection140
2.4 Requirements Documentation: System Protection142
2.5 Requirements Traceability Matrix: System Protection144
2.6 Project Scope Statement: System Protection146
2.7 Assumption and Constraint Log: System Protection148
2.8 Work Breakdown Structure: System Protection150
2.9 WBS Dictionary: System Protection152
2.10 Schedule Management Plan: System Protection155
2.11 Activity List: System Protection157
2.12 Activity Attributes: System Protection159
2.13 Milestone List: System Protection161
2.14 Network Diagram: System Protection163
2.15 Activity Resource Requirements: System Protection165
2.16 Resource Breakdown Structure: System Protection167
2.17 Activity Duration Estimates: System Protection169
2.18 Duration Estimating Worksheet: System Protection171
2.19 Project Schedule: System Protection173
2.20 Cost Management Plan: System Protection175
2.21 Activity Cost Estimates: System Protection177
2.22 Cost Estimating Worksheet: System Protection179
2.23 Cost Baseline: System Protection181
2.24 Quality Management Plan: System Protection183
2.25 Quality Metrics: System Protection185
2.26 Process Improvement Plan: System Protection187
2.27 Responsibility Assignment Matrix: System Protection189
2.28 Roles and Responsibilities: System Protection191
2.29 Human Resource Management Plan: System Protection193
2.30 Communications Management Plan: System Protection195
2.31 Risk Management Plan: System Protection197
2.32 Risk Register: System Protection199
2.33 Probability and Impact Assessment: System Protection201
2.34 Probability and Impact Matrix: System Protection203
2.35 Risk Data Sheet: System Protection205
2.36 Procurement Management Plan: System Protection207
2.37 Source Selection Criteria: System Protection209
2.38 Stakeholder Management Plan: System Protection211
2.39 Change Management Plan: System Protection213
3.0 Executing Process Group: System Protection215
3.1