Anthony C. Caputo, in
Digital Video Surveillance and Security (Second Edition), 2014 Project management provides direction, monitoring, and control of all
project personnel, including the customer. This is a valuable addition to the overall project in maintaining timely project communications and reporting and avoiding scope creep. Here we discuss the various activities and tasks required to manage a project, with more on how to manage the project in Chapter 10. Project management maintains project communication among all parties, enforcing documentation and procedural standards for the project
and requiring that players actively participate in project status meetings (in person, online, and teleconferences); preparing, presenting, and submitting status reports, and reviewing and administering the project change control process. If the project is out of scope, it’s up to the project manager to let everyone know and present ideas for how that can be handled. Successful DVS project managers will review the SOW and associated documents and even if
they do not understand the technology and/or meaning, they can decipher the activities and tasks, along with the associated hours and working with the technical engineers to coordinate and manage the technical activities. The project manager should track and monitor delivery of equipment, review inventory, and establish and maintain communication with vendors, suppliers, subcontractors, and technical engineers. The project manager also takes ownership of the
project plan, measuring, tracking, resolving deviations, and evaluating progress against the schedule presented in the SOW and the initial project plan developed during the initiation of the project. At what is sometimes referred to as kick-off meeting, the project manager will introduce the project participants, reviewing project team roles and responsibilities along with the project objectives and methodology. A primary action item for this
meeting is the development of a project plan, with the proposed schedule for individual activities and tasks based on responsibilities laid out in the SOW (usually included in some form of an implementation plan), with any milestones and dependencies, security and safety procedures, and security clearances. An architectural review of the design will be carried out with any limitations and conclusions, inviting and confirming attendance of all intended
participants, including various decision-making levels in the security, information technology, and operations management areas. This is an ongoing activity until project implementation is completed, at which point the project manager leads project closure. The document deliverables include the finalization of the statement of work,
requirements definition, work breakdown structure, bill of materials, a final acceptance test plan, and all the documents required during implementation, such as site survey results, proposed schedule, testing results, and training materials. All the required deliverables should be listed in the statement of work, along with their associated costs. Documentation includes the written materials, work papers, configurations manuals, and other work products that
set forth the technical and functional specifications and operating information for the applicable software, deliverable, developed material, or goods prepared for the specific project. See the “Project Documentation Deliverables” section in Chapter 10, “Project Implementation,” for more information.An Architectural Design Approach
Project Management
Document Deliverables
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B978012420042500006X
Site Survey
Anthony C. Caputo, in Digital Video Surveillance and Security, 2010
Digital Camera
The site survey typically becomes a document deliverable and as such it requires details on the findings and recommendations. Thanks to digital photography, recording area of coverage, obstacles, discoveries, and specific camera installation locations is fast, cheap, and easy. A single photograph of an obstruction is worth a thousand words of description. Always bring a digital camera whenever doing a site survey.
Digital Camera Power
There you are with your customer, walking the area of coverage where he points out those unique areas that he needs monitored to improve the security and safety of the facility(s). These are very select locations and there are many. Good thing you have your digital camera to record these nuances in the customer's system requirements, but alas, upon pulling out your fancy digital pocket camera, you discover the rechargeable battery is dead. This is why I always carry a spare high-quality digital pocket camera that uses AA batteries and extra batteries.
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B9781856177474000068
Site Surveys
Anthony C. Caputo, in Digital Video Surveillance and Security (Second Edition), 2014
Digital Camera
The site survey typically becomes a document deliverable and as such, it requires details on the findings and recommendations. Thanks to digital photography, photographically recording area-of-coverage, obstacles, discoveries, and specific camera installation locations is fast, cheap, and easy. A single photograph of an obstruction includes the thousand words of description an image can provide. Always bring a digital camera whenever you’re doing a site survey. It also helps to write notes that cross-reference your photos, to refresh your memory later.
DIGITAL CAMERA POWER
There you are, with your customer, walking the area of coverage where she points out those unique areas that she needs monitored to improve the security and safety of the facility(s). These are very select locations, and they are many. Good thing you have your digital camera to record these nuances in the customer’s system requirements, but alas, upon pulling out your fancy digital pocket camera, you discover that the rechargeable battery is dead.
This is why I always carry a spare high-quality digital pocket camera that uses AA batteries and carry extra batteries with me. I went through two sets of AAs in Dallas just this week.
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B9780124200425000071
Project Implementation
Anthony C. Caputo, in Digital Video Surveillance and Security (Second Edition), 2014
Project Documentation Deliverables
Status reports are part of the project’s document deliverables. Documentation is an essential part of any project and becomes even more important the more complex the project. Unfortunately, I’ve been thrown into integration situations where there were no documents, diagrams, as-builts, or even manuals for the existing equipment. I had to assume this was a scheduling (budgetary) issue and not a purposeful attempt to conceal information. At that point, reverse engineering was the only means of understanding how the proprietary system worked and whether there was any integration potential.
I believe (and it’s not because I’m an author) that document deliverables are important to all projects for the simple fact that they show the customer all the work that was accomplished for their money. Rarely will there be a customer representative watching each stage or task of the project. Document deliverables record many of those monumental obstacles that were cleared and the numerous decisions, workarounds, and typical issues that are part of any system implementation. There isn’t that much time available for someone who already faces a day full of regular duties and responsibilities to communicate every little decision. The document deliverables show customers that they are getting their money’s worth.
The types of document deliverables vary dramatically and are solely based on the specific requirements of the implementation, but it is best practice to leave (at the very least) a “cheat sheet” of how to use the VMS software. This way, anyone, new or old, can learn how to use the very basic features of the DVS system (if they’re authorized).
Table 10.5 provides an overview of the types of documents that may be required as deliverables, depending on the organization and size of the project.
Table 10.5. Project Documentation and Descriptions
Administrative documentation | Documents pertaining to the administrative operations of the project, including documents for funding, personnel, staffing, equipment licenses and warranties, etc. |
Analyses and recommendations | Documents describing a specific problem or scenario and the anticipated impact and/or recommended course(s) of action. |
Contract management documentation | Documents associated with the solicitation, administration, and management of the contractors supporting the project. |
Correspondence and communications | Documents sent to or received from any organization external to the project, including the sponsor, control agencies, federal stakeholders, counties, advocates, and the public. |
Critical email is retained, such as important information received from contractors or other outside sources related to the project. Project staff should not use email for formal communication or decision making on the project (because email is a binding contract in a court of law). Any critical email should be archived and noncritical email purged at the user’s discretion. | |
Plans and processes | Documents describing the purpose and approach to the project, including the plans and processes that describe how the project will be executed and managed. |
Presentations | Documents used in training or briefing project staff, city or county staff, or stakeholders. |
Reference materials | Documents generated by an external organization that provide insight, guidance, or examples of pertinent information, such as legislation, policy, regulations, handbooks, standards, etc. |
Status documentation | Documents describing the current status of planned and actual activities for the project, including funding, contract, schedule, issue and risk status, and meeting minutes describing decisions, action items, and concerns. |
Working papers | Early drafts, notes, or reference materials used to create another document. Working papers may or may not be retained, at the author’s discretion. |
Table 10.6 shows several actual documents produced for a number of DVS projects, their descriptions, inputs, and the tools used to create the documents. The use of these documents as part of a DVS implementation is entirely based on the requirements and size of the installation. The larger the size of the install, the more project management will be required to control and monitor the progress.
Table 10.6. Project Document Deliverables
Design and configuration plan | A document that includes the overall design concepts and the individual configurations of the proposed equipment | DVS requirements document, statement of work from all stakeholders, all site survey forms and documentation, conceptual design documentation | Microsoft Word, Visio Professional |
Implementation plan | A documented approach to the delivery of the DVS system | DVS requirements document, statement of work from all stakeholders, design documentation | Microsoft Word, Visio Professional |
Detailed project plan | A documented task list, calendar timetable (with associated costs for internal use) for completion (produced in Microsoft Project) | DVS requirements document, statement of work from all stakeholders, WBS, all site survey forms and documentation and design documentation | Microsoft Project Professional and Word |
Communication management plan | A documented approach to networking maintainability | DVS requirements document, statement of work from all stakeholders, WBS, all site survey forms and documentation and design documentation | Microsoft Project, Visio Professional, and Word |
Quality assurance plan | A plan outlining the quality philosophy of the project, its subcontractors, and a detailed approach to ensuring that contractual requirements are met | DVS requirements document, statement of work from all stakeholders, WBS, all site survey forms and documentation and design documentation | Microsoft Project, Visio Professional, and Word |
Risk management plan | An account of how risks will be recognized, confirmed, documented, and handled | Detailed project plan, DVS requirements document, statement of work from all stakeholders | Microsoft Project, Visio Professional, and Word |
Project team | An organizational chart of all stakeholders, their positions, duties, and responsibilities | Project plan, DVS requirements document, quality assurance plan, risk management plan | Microsoft Project, Visio Professional, and Word |
“As-built” system documentation | Detailed documented evidence of the actual installation/integration | DVS requirements document, statement of work from all stakeholders, all site survey forms and documentation, conceptual design documentation | Microsoft Office Suite |
Final acceptance test plan | First article testing procedures, confirming system is in operational mode at system launch | DVS requirements document, quality assurance plan, statement of work from all stakeholders, all site survey forms and documentation, risk management plan, project plan, conceptual design documentation, as-builts | Microsoft Word, Excel, and PowerPoint (if a separate presentation) |
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B9780124200425000101
Anthony C. Caputo, in Digital Video
Surveillance and Security, 2010 Below are examples of tables that can be used to track document deliverables.
Project Implementation
Example Tables for Document Deliverables
Version number
2.0
Document name
Document and Procedural Standards v2.0
File name
10102010_DocumentProceduralStandards_v2.doc
Repository/Access
Approvers | ||
Customer Approvers | ||
Revision STATUS
1.0 | XX/XX/XXX | Preliminary draft |
2.0 | XX/XX/XXX | Description of revision |
Prepared By: | [Author's Name] | __________________________________ | ________________ |
Signature | Date | ||
Reviewed By: | [Project Manager] | __________________________________ | ________________ |
Signature | Date |
A revision status block should be provided for all submitted documents including maps, diagrams, floor plans, and conduit pathway plans. The revision block should identify the revision number/letter, date of revision, a description of the change, the creator of the document, and the person adding the revision change.
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B9781856177474000093
The Components of TOGAF Architecture
Philippe Desfray, Gilbert Raymond, in Modeling Enterprise Architecture with TOGAF, 2014
3.5 Deliverables
3.5.1 Description and use
Deliverables play a special role in the progress of an ADM cycle. The approval of deliverables by stakeholders establishes formal consensus and defines a state of results from which future work can be carried out. This does not mean that each deliverable is provided and validated by one single phase. On the contrary, many deliverables are developed over the course of several phases, each progressively adding to and consolidating the deliverable in question. In this case, deliverables can be viewed as the gateways that involve the review and acceptance of outputs from one phase/activity as input into the next. This is the case for the “architecture definition document,” whose different parts are developed during phases B, C, and D for the chapters dedicated to business architecture, system architecture, and technology architecture, respectively.
Deliverables are mostly documents, put together from architecture elements, “building blocks,” and artifacts. However, certain deliverables are represented directly by models. This is the case for the “ABB” deliverable, whose aim is to formalize an architecture model.
TOGAF defines 22 deliverables and provides a description and a template for each. As an example, the template for the “architecture definition document” deliverable presents as follows:
•Scope
•Goals and constraints
•Architecture principles
•Baseline architecture
•Architecture models
•Business architecture models
•Data architecture models
•Application architecture models
•Technology architecture models
•Rationale and justification for architectural approach
•Mapping to the architecture repository
•Mapping to the architecture landscape
•Mapping to reference models
•Mapping to standards
•Reuse assessment
•Gap analysis
•Impact assessment
As we can see (and possibly regret), TOGAF provides a highly succinct description of the document template. It is described more as a typical table of contents, which must be further specified if it is to be effectively used within a particular organization.
Note that this deliverable includes several diagrams from business, application, and technological models.
3.5.2 Deliverables and ADM phases
Table 3.1 presents the main deliverables resulting from the different ADM phases.
Table 3.1. Deliverables and ADM Phases
L01 | Request for Architecture Work | Pr |
L02 | Architecture Principles | Pr |
L03 | Tailored Architecture Framework | Pr |
L04 | Business Principles, Business Goals, and Business Drivers | Pr, A, B |
L05 | Architecture Vision | A |
L06 | Statement of Architecture Work | A |
L07 | Communication Plan | A |
L08 | Architecture Definition Document | B, C, D |
L09 | Architecture Requirements Specification | B, C, D, E, F |
L10 | Architecture Roadmap | B, C, D, E, F |
L11 | Transition Architecture | E, F |
L12 | Implementation and Migration Plan | E, F |
L13 | Architecture contract | F |
L14 | Capability Assessment | A, E |
L15 | Compliance Assessment | G |
L16 | Change Request | H |
In this table, we have chosen to highlight the major deliverables corresponding to each ADM phase, without taking into account possible updates or adjustments that can always occur in other phases.
We have not included the architecture repository in our table. Although TOGAF classifies this as a deliverable, it is rather an information container, which is only validated through the documents that result from its contents (the same is true for ABB and SBB).
The Tailored Architecture Framework (L03), developed during the preliminary phase, plays a special role. Typically, it enables the TOGAF framework to be adapted to the enterprise’s context. It is one of the results of the preliminary phase, which initiates the elements that are to be implemented by transformation projects on different levels: approach, contents, repository, and governance.
The Request for Architecture Work (L01), which results from the preliminary phase, triggers the start of a new ADM cycle. Note here that the response may be negative and the enterprise may decide not to start the architecture change ADM cycle (go-no go).
During phase A, the Statement of Architecture Work (L06) describes all the elements necessary to the organization of the ADM cycle, based on the request for architecture work: management, procedures, cycle planning, and scope.
The Communication Plan (L07), also produced in phase A, provides the internal communication framework: means, tools, and procedures.
The Architecture Principles (L02), defined during the preliminary phase, establish the general architecture principles that apply to all ADM cycles.
The Business Principles, Business Goals, and Business Drivers (L04) specify the context and goals of an ADM cycle. Initialized during the preliminary phase, they are added to and consolidated during phases A and B (vision and business).
Requirements are recorded in the Architecture Requirements Specification document (L09).
During phase A, the Architecture Vision (L05) initiates future work by providing a macroscopic and cross-organizational view: goals, requirements, baseline, and target architectures.
The Architecture Definition Document (L08) is the main deliverable of the architecture development phases: B (Business), C (Information System), and D (Technology). In particular, it contains information on architecture (baseline and target), gap analysis, and impact analysis.
The Architecture Roadmap (L10) results from the development phases B, C, and D and establishes the progression of the transition, the definition of each stage, and macroscopic planning. These elements will be defined by the two following deliverables, during phases E and F.
The Transition Architecture (L11) describes the different stages of transition, and the breakdown of work into work packages, each with its content and dependencies. It also details the architecture expected at each stage.
The Implementation and Migration Plan (L12) provides the detailed schedule, implementation project, resources, and budget.
Architecture contracts (L13) formalize implementation project commitments with regard to the architecture board (phase F).
The results of compliance reviews are recorded in the Compliance Assessment document (L15). These reviews are conducted during phase G.
Once the new architecture has been deployed (phase H), Change Requests (L16) can be sent to and assessed by the architecture board.
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B9780124199842000033
Towards an Adaptive e-Assessment System Based on Trustworthiness
D. Baneres, ... X. Baró, in Formative Assessment, Learning Data Analytics and Gamification, 2016
3 Adaptive Trust-Based Model
In this section, we define an adaptive trust-based model that measures the level of confidence (or trust level) of the learner. The measurement is performed by analyzing evidences collected from the learner through different activities and interactions. Such trust level is basically represented as a score, dynamically updated according to the collected evidences during the period of time the learner is in the university.
Evidences stem from analyzing the behavior of the learner during his or her studies. The security mechanisms placed in the VLE, in the assessment activities, and in the FEs provide automatic evidences to update the trust score. Note that, not all evidences come from automatic systems. Instructors could also provide manual evidences from his interaction with the learners.
The model cannot be applied in a straightforward manner throughout a program. The assessment activities and the FEs of individual subjects should be globally designed to deploy different security mechanisms, from on-site face-to-face to fully virtual activities, throughout the program. Each activity may have multiple designs and each design may deploy a different set of security mechanisms. Note that, this adaptation of an activity to multiple designs may be difficult, and one fundamental objective is that the evaluated knowledge and competences should be equivalent for all designs. These designs will be triggered depending on the current trust score of a learner. For instance, an activity may be evaluated using an interview for learners with a low trust score, but just as a deliverable document for learners with a higher trust score.
Fig. 2.1 shows the flow of the model on an assessment activity. During the pre-process activity phase, the score dynamically decides which design of the activity should be performed by the learner based on the security mechanisms that need to be raised depending on the trust level of the learner.
Figure 2.1. Model flow.
At the end of each activity, during the post-process activity phase, each security mechanism outputs different evidences. In the most common scenario, the system cannot definitely decide that an infraction has happened. Often, automated security mechanisms can only provide a probability of infraction depending on the collected data. This probability depends on the learner's actions, since some of them might be flagged as suspicious, but with reasonable doubt. The final probability is used to calculate a partial trust score, which will impact the learner's global score. On the other hand, it is possible that the mechanism detects an infraction beyond any reasonable doubt. In this scenario, there is no partial trust score. A penalty is inflicted on the learner and his global trust score is automatically lowered to 0. Collected evidences are used to justify the penalty to the learner.
Fig. 2.2 illustrates an example of the model behavior through a program. Let us assume a learner starts a program under this model. Therefore, assessment activities have been designed including a broad set of different security mechanisms. The chart shows the evolution of the trust score through different semesters where the Y-axis denotes the learner's global score and the X-axis denotes the semesters. We can observe that each semester has different assessment activities (represented by a dot).
Figure 2.2. Example of application of the model.
When a learner starts the program, the score is set to 0. There is no evidence of confidence. Therefore, the learner should demonstrate through his behavior that the institution can trust him. The subjects of the first semester set up the trust score and the selected security mechanisms through the design of the activities will tend to be strict, that is, an on-site FE or interviews. Given the partial activity scores, at some point, the score could increase. In this case, other types of mechanisms may be used for new activities (see fourth semester in Fig. 2.2), adapting the assessment activities to the learner's behavior.
Note that, the objective of this model is not to penalize learners with a low level of confidence, but rather to benefit learners with higher levels. The designs defined as hard are the default assessment activities in a program without this model. If a learner does not demonstrate any evidence of trust, the standard process of evaluation is followed, whereas a learner with a higher level benefits from other less exhaustive evaluation activities. Based on this idea, this model needs constant information to maintain the score, that is, the score decreases on semesters where the learner is not enrolled in any course (see fifth and sixth semester in Fig 2.2).
Read full chapter
URL: //www.sciencedirect.com/science/article/pii/B9780128036372000026