Скачать книгу

transfer to the corresponding spoke in the Security Administration Scorecard on the second next page of the Self-Assessment.

      Your completed Security Administration Scorecard will give you a clear presentation of which Security Administration areas need attention.

      Security Administration

      Scorecard Example

      Example of how the finalized Scorecard can look like:

      Security Administration

      Scorecard

      Your Scores:

      BEGINNING OF THE

      SELF-ASSESSMENT:

      Table of Contents

      About The Art of Service7

      Included Resources - how to access7

      Purpose of this Self-Assessment9

      How to use the Self-Assessment10

      Security Administration

      Scorecard Example12

      Security Administration

      Scorecard13

      BEGINNING OF THE

      SELF-ASSESSMENT:14

      CRITERION #1: RECOGNIZE15

      CRITERION #2: DEFINE:27

      CRITERION #3: MEASURE:43

      CRITERION #4: ANALYZE:57

      CRITERION #5: IMPROVE:73

      CRITERION #6: CONTROL:89

      CRITERION #7: SUSTAIN:102

      Security Administration and Managing Projects, Criteria for Project Managers:127

      1.0 Initiating Process Group: Security Administration128

      1.1 Project Charter: Security Administration130

      1.2 Stakeholder Register: Security Administration132

      1.3 Stakeholder Analysis Matrix: Security Administration133

      2.0 Planning Process Group: Security Administration135

      2.1 Project Management Plan: Security Administration137

      2.2 Scope Management Plan: Security Administration139

      2.3 Requirements Management Plan: Security Administration141

      2.4 Requirements Documentation: Security Administration143

      2.5 Requirements Traceability Matrix: Security Administration145

      2.6 Project Scope Statement: Security Administration147

      2.7 Assumption and Constraint Log: Security Administration149

      2.8 Work Breakdown Structure: Security Administration151

      2.9 WBS Dictionary: Security Administration153

      2.10 Schedule Management Plan: Security Administration156

      2.11 Activity List: Security Administration158

      2.12 Activity Attributes: Security Administration160

      2.13 Milestone List: Security Administration162

      2.14 Network Diagram: Security Administration164

      2.15 Activity Resource Requirements: Security Administration166

      2.16 Resource Breakdown Structure: Security Administration168

      2.17 Activity Duration Estimates: Security Administration170

      2.18 Duration Estimating Worksheet: Security Administration172

      2.19 Project Schedule: Security Administration174

      2.20 Cost Management Plan: Security Administration176

      2.21 Activity Cost Estimates: Security Administration178

      2.22 Cost Estimating Worksheet: Security Administration180

      2.23 Cost Baseline: Security Administration182

      2.24 Quality Management Plan: Security Administration184

      2.25 Quality Metrics: Security Administration186

      2.26 Process Improvement Plan: Security Administration188

      2.27 Responsibility Assignment Matrix: Security Administration190

      2.28 Roles and Responsibilities: Security Administration192

      2.29 Human Resource Management Plan: Security Administration194

      2.30 Communications Management Plan: Security Administration196

      2.31 Risk Management Plan: Security Administration198

      2.32 Risk Register: Security Administration200

      2.33 Probability and Impact Assessment: Security Administration202

      2.34 Probability and Impact Matrix: Security Administration204

      2.35 Risk Data Sheet: Security Administration206

      2.36 Procurement Management Plan: Security Administration208

      2.37 Source Selection Criteria: Security Administration210

      2.38 Stakeholder Management Plan: Security Administration212

      2.39 Change Management Plan: Security Administration214

      3.0 Executing Process Group: Security Administration216

      3.1 Team Member Status Report: Security Administration218

      3.2 Change Request: Security Administration220

      3.3 Change Log: Security Administration222

      3.4 Decision Log: Security Administration224

      3.5 Quality Audit: Security Administration226

      3.6 Team Directory: Security Administration229

      3.7 Team Operating Agreement: Security Administration231

      3.8 Team Performance Assessment: Security Administration233

      3.9 Team Member Performance Assessment: Security Administration235

      3.10 Issue Log: Security Administration237

      4.0 Monitoring and Controlling Process Group: Security Administration239

      4.1 Project Performance Report: Security Administration241

      4.2 Variance Analysis: Security Administration243

      4.3 Earned Value Status: Security Administration245

      4.4 Risk Audit: Security Administration247

      4.5 Contractor Status Report: Security Administration249

      4.6 Formal Acceptance: Security Administration251

      5.0 Closing Process Group: Security Administration253

      5.1 Procurement Audit: Security Administration255

      5.2 Contract Close-Out: Security Administration257

      5.3 Project or Phase Close-Out: Security Administration259

      5.4 Lessons Learned: Security Administration261

      Index263

      CRITERION #1: RECOGNIZE

      INTENT: Be aware of the need for change. Recognize that there is an unfavorable variation, problem or symptom.

      In my belief, the answer to this question is clearly defined:

      5 Strongly Agree

      4 Agree

      3 Neutral

      2

Скачать книгу