This Request will consist of three Important part that should be understanded before starting this Business:
1. The Paper should be paragraphed (one up to one and half page) introduction, body in details, conclusion.
1. One response to one pair that include one different reference of the actual paper and on the same subject (two up to three lines).
1. One response to one pair that include one different reference of the actual paper and on the same subject (two up to three lines).
Module 13: Systems Development and Project Management:
London Heathrow Airport was the busiest international airport in the world when British Airways (BA), the flagship airline of the UK, promoted their new Terminal 5. The CEO decided that all BA activity in other terminals would cease and overnight, everything would transfer to the new terminal for opening the next day. Terminal 5 was described as one of the most technologically advanced airport terminals in the world.
During the first five days, BA misplaced more than 23,000 bags, cancelled 500 flights and made millions in losses. BA later revealed that staff had not been trained properly, loading staff were unable to sign on to the baggage-reconciliation system. Problems with the wireless Lan meant that staff could not enter information on bags into the system which also could not receive information about bags transferring from other airlines. Eventually the reconciliation system failed completely, so bags missed their already delayed flights. Towards the end of the first day BA told passengers they would be leaving without their luggage and that anyone who had not yet checked in could choose between travelling without baggage or re-booking their flight.
This is now a textbook example of how not to develop and implement new systems.
Select a large-scale system implementation and explain the following information in your response:
· What type of a large-scale system was implemented and why?
· What issues occurred when this system was implemented?
· What could have been done to prevent these issues from occurring?
Support your initial discussion post with at least two scholarly references.
You are required to reply to at least two peer discussion question ‘’ Need to provide this Part from your Side through providing two to three lines of information of the subject with their reference of each peer respond’’. post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post’s answer. Normal course dialogue does not fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.
Embed course material concepts, principles, and theories (including supporting citations) along with at least two current, scholarly, peer-reviewed journal articles. You may find that your discussion of leadership characteristics is easily supported with such current scholarly research, while the information about how your chosen leader exhibits those leadership characteristics is supported by popular research.
Keep in mind that current scholarly references can be found in the Saudi Digital Library by conducting an advanced search. Current research means published in the last five years.
· The reference Should be in Apa7th and add in-citation Text. And up to 3 or more references.
· Discussion Should include Introduction, body or analysis, conclusion.
· It should be paragraphed of one to one & half page.
· Need to provide this Part from your Side through providing two up to three lines of information of the subject with their separated reference of each peer respond
· ‘’ need two peer responds – with different refrances’’
· I would like to see more depth for the question
· Plagiarism All work must be free of any form of plagiarism.
· Written answers into your own words. Do not simply cut and paste your answers from the Internet and do not copy your answers from the textbook
Required:
Chapter 13 in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Ramirez, A., Aiello, A., & Lincke, S. J. (2020). A Survey and Comparison of Secure Software Development Standards. 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) – Digital Transformation – Potentials and Challenges (51275), 1–6.
Nunez, J. C. S., Lindo, A. C., & Rodriguez, P. G. (2020). A preventive secure software development model for a software factory: A case study. IEEE Access, 8, 77653–77665.
Recommended: