0% found this document useful (0 votes)
1K views

PCP Sample

The document summarizes an internal verification of assessment decisions for a BTEC Higher National Diploma in Computing program. It details the assessment of a student's assignment on managing a successful computing project. The internal verifier confirmed that the assessor's evaluation matched the assignment criteria and justified a Merit grade. Feedback to the student was constructive and linked to the criteria. The internal verifier agreed with the assessor's decision and signature.

Uploaded by

Dulanja Omesh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

PCP Sample

The document summarizes an internal verification of assessment decisions for a BTEC Higher National Diploma in Computing program. It details the assessment of a student's assignment on managing a successful computing project. The internal verifier confirmed that the assessor's evaluation matched the assignment criteria and justified a Merit grade. Feedback to the student was constructive and linked to the criteria. The internal verifier agreed with the assessor's decision and signature.

Uploaded by

Dulanja Omesh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 81

`

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Mr. Geeth Weerasinghe Ms. Madusha Lakmali


Assessor Internal
Verifier
Unit 06: Managing a Successful computing project
Unit(s)

Vulnerability Assessment - Management Information System Project


Assignment title

Student’s name

List which assessment Pass Merit Distinction


criteria the Assessor has
P1,P2,P3,P4,P5,P6,P7 M1, M2, M3,M4 D1,D2,D3
awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match Yes. The assessment criteria matched with
those shown in the assignment brief? Y/N the criteria’s mentioned in the assessment
brief.
Is the Pass/Merit/Distinction grade Yes. The assessor has awarded a Merit to the
awarded justified by the assessor’s learners work. Student has done an average
comments on the student work? Y/N work on his assessment and assessor has
given sufficient comments to the student
work.

Has the work been assessed Yes. Assessor has assessed the student work
Y/N accurately and provided detailed comments
accurately?
on the body of the document
Is the feedback to the student: Assessor has provided constructive feedback
Give details: on the learner’s work.
• Constructive? Y/N
The given comments are linked to the
• Linked to relevant assessment Y/N
Y/N assessment criteria’s and also provided areas
criteria?
need to be improved by the student. Assessor
• Identifying opportunities for has mentioned the actions needs to be taken
improved performance? Y/N
to improve the quality of the work done by
• Agreeing actions? the student.
Does the assessment decision need Agree with the grade awarded by the
Y/N assessor.
amending?
[email protected] 20/07/2021
Assessor signature Date

1
| Unit-6 Managing a Successful Computing Project |Assignment No6
`
[email protected] 20/07/2021
Internal Verifier signature Date

2
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

Programme Leader signature (if


Date
required)

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal
Date
Verifier
signature
Programme Leader
Date
signature (if
required)

3
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

Higher Nationals – Summative Assignment Feedback Form

Student Name/ID

Unit Title Unit 6 Managing a Successful Computing Project

Assignment Number 6 Assessor Ms Madusha Lakmali

10/07/2021 DateReceived1s 10/07/2021


Submission Date
tsubmission
N/A DateReceived2ndsub N/A
Re-submission Date
mission
Assessor Feedback:
LO1.Establish project aims, objectives and time frames based on the chosen theme
Pass, Merit & P1 P2 P3 M1
Distinction Descripts
LO2. Conduct small-scale research, information gathering and data collection to generate knowledge

to support the project


Pass, Merit & P4 M2 D1
Distinction Descripts

LO3. Present the project and communicate appropriate recommendations based on meaningful conclusions
drawn from the evidence findings and/or analysis.
Pass, Merit & P5 P6 M3 D2
Distinction Descripts

LO4. Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
Pass, Merit & P7 M4 D3
Distinction Descripts

4
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

Grade: DISTINCTION Assessor Signature: [email protected] Date: 20/07/2021

Resubmission Feedback:

Grade: N/A Assessor Signature: N/A Date: N/A

Internal Verifier’s Comments:


The learner had successfully covered the assessments to a DISTINCTION grade. Agreeing with the 1st assessor.

Signature & Date: [email protected] 20/07/2021


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

5
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

Assignment Feedback

Formative Feedback: Assessor to Student

Overall, the leaner has covered every requirement of the assignment brief by providing quality contend
which adhere to the assignment case study. Report structure and formatting should be changed in some
places. Given on the content provided, the learner has a higher potential for improvements. Need more
references for the sections where the learner has used theoretical contents.

Action Plan

Need to revisit the references and provide the citation where it needed. Need to bring more citations in the
assessment. Keep up the good work!

Summative feedback

Assessor - The learner has completed the coursework successfully to meet all the learning outcomes.
Furthermore, the learner should focus more on personal development and continue this momentum through
out the programme.

IV - Assessor has assessed the learner fairly and sufficient feedback was given. The learner should improve
on developing answer within the allocated word count. However appreciate the learner’s effort and
recommend a DISTINCTION.

Feedback: Student to Assessor

I would like to thank our lecturer for the encouragement in carrying out this assignment work and I would like to
thank other staff members of ESOFT Metro Campus who gave us their fullest support and during the period of our
assignment work.

6
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

[email protected] 20/07/2021

Assessor signature Date

20/07/2021

Student signature Date

7
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

Pearson
Higher Nationals in
Computing

Unit 6: Managing a Successful Computing Project

8
| Unit-6 Managing a Successful Computing Project |Assignment No6
`

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

9
| Unit-6 Managing a Successful Computing Project |Assignment No6
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my
own without attributing the sources in the correct way. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Pearson UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments
for this program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my own, and
where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement
between myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached to
the attached.

10/07/2021
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

NA
Managing A Successful Computing Project
Unit 06

Page | 10
Higher National Diploma in Computing
Assignment Brief

Student Name /ID Number

Unit Number and Title Unit 6: Managing a Successful Computing Project

Academic Year 2020/2021

Unit Tutor Geeth Weerasinghe

Assignment Title Vulnerability Assessment - Management Information System Project

Issue Date 21/03/2021

Submission Date 10/07/2021

IV Name & Date Ms. Madusha Lakmali 20.07.2021

Submission Format:

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing (refer to the assignment guidelines for more details). You are required to make use
of headings, paragraphs, and subsections as appropriate, and all work must be supported with research
and referenced using Harvard referencing system. Please provide in-text citation and a list of references
using Harvard referencing system.
Please note that this is an individual assessment and your report should include evidences to that you
have conducted a research to collect relevant data individually.

NA
Managing A Successful Computing Project
Unit 06

Page | 11
Unit Learning Outcomes:

LO1 Establish project aims, objectives and timeframes based on the chosen theme.

LO2 Conduct small-scale research, information gathering and data collection to generate knowledge to
support the project.

LO3 Present the project and communicate appropriate recommendations based on meaningful
conclusions drawn from the evidence findings and/or analysis.

LO4 Reflect on the value gained from conducting the project and its usefulness to support sustainable
organizational performance.

Assignment Brief and Guidance:

Internet of Things (IoT) in an Information System Project

Research Topic: The IoT has already started to impact on the day to day interactions we have with the
gadgets in our home (smart homes) our office (smart buildings) and in the local environment (smart
cities). Explore the ways this may further impact individuals and society both positively and negatively.
You are expected to carry out a small-scale research in order to explore the ways Internet of Things (IoT)
may impact individuals in an organization and society both positively and negatively from the standpoint
of a prospective computing professional.

IoT has already started to impact on the day to day interactions we have with the gadgets in our homes
(smart homes) and offices (smart buildings) and in the local environment (smart cities). The Internet of
Things (IoT) is the term which refers to the ever-growing network of physical objects with embedded
sensors which can connect together via Internet allowing communication to occur between these objects
and many other Internetenabled devices and systems. The IoT is quickly becoming a necessary aspect of
people’s daily working lives. Physical items can now sense and collect data which can be controlled
through digital and smart technology. The IoT extends internet connectivity beyond traditional devices

NA
Managing A Successful Computing Project
Unit 06

Page | 12
like desktop and laptop computers, smartphones and tablets to a diverse range of devices that can utilise
embedded technology such as security systems, thermostats, cars, electronic appliances, lights, medical
equipment etc. These devices, often called "connected" or "smart" devices, can talk to other related
devices (machine-to-machine (M2M) communication) and act on the information they get from one
another. Along with the many benefits there is also considerable concern over the IoT which must be
overcome in order to harness the power of this free flow of information.

This assignment focuses to enable you as a student researcher to explore the benefits of the IoT and the
most pressing challenges and how to overcome them within a defined period of time. The report should
include,
• A comprehensive project management plan
• Evaluation of data collection methods and data analysis tools and/or techniques should be provided
• Appropriate recommendations should be provided
• Reflect on the value gained from conducting the project and its usefulness to support sustainable
organisational performance
You are required to complete the project within 3 months and the project plan and resources should be
finalized as per the requirement of the client.

NA
Managing A Successful Computing Project
Unit 06

Page | 13
TASK – 01

Develop aims and objectives for the chosen project and produce a comprehensive project management plan
including work breakdown structure (WBS), Gantt chart, scope statement, cost, quality, risk and
communication management plans. Your schedule must be developed with realistic durations and milestones
so that it helps to monitor, and control project aims and objectives.

TASK – 02

Carry out the project that you have planned in task 1 by applying qualitative, quantitative research methods and
critically evaluate project management process and the methodologies applied justifying how appropriate they
are to meet project aims an objectives.

TASK – 03

Analyze research data collected using the suitable tools and techniques and communicate appropriate
recommendations. Evaluate the accuracy and authenticity of the selected tools and techniques to elaborate and
justify the recommendations suggested.

TASK – 04

Reflect on and evaluate the value of using quality research and project management process to meet stated
project objectives and improve own learning and performance. Your answer must include a critical evaluation
and a reflection of project outcomes, decision making process and the changes occurred to the initial project
management plan to justify the learnings and project recommendations.

NA
Managing A Successful Computing Project
Unit 06

Page | 14
Grading Rubric
Grading Criteria Achieved Feedback

LO1 Establish project aims, objectives and timeframes based on the


chosen theme
P1 Devise project aims and objectives for a chosen scenario. Achieved The learner has clearly stated the project scope, aim and objectives
associated with the project undertaken
P2 Produce a project management plan that covers aspects of cost, Achieved The learner has provided a sufficient answer to meet the learning
criteria.
scope, time, quality, communication, risk and resources.
P3 Produce a work breakdown structure and a Gantt Chart to Achieved The learner has produced a Work breakdown structure and a Gantt
Chart shows how the tasks have been divided.
provide timeframes and stages for completion.
M1 Produce a comprehensive project management plan, milestone Achieved The learner has produced a comprehensive project management report
to meet the learning criteria.
schedule and project schedule for monitoring and completing the
aims and objectives of the project.
LO2 Conduct small-scale research, information gathering and data
collection to generate knowledge to support the project

P4 Carry out small-scale research by applying qualitative and Achieved The learner has carried out a mix method to conduct the research
methodology. Evidences were mentioned accordingly.
quantitative research methods appropriate for meeting project aims
and objectives.

NA
Managing A Successful Computing Project
Unit 06
Page | 15
M2 Evaluate the accuracy and reliability of different research Achieved The learner has covered a holistic review to meet the learning criteria.

methods applied.
D1 Critically evaluate the project management process and Achieved The learner has adequately evaluated the PM process.
appropriate research methodologies applied.
LO3 Present the project and communicate appropriate
recommendations based on meaningful conclusions drawn from the
evidence findings and/or analysis
P5 Analyse research and data using appropriate Achieved The learner has analyzed the research finding via the
appropriate tools and techniques. Evidences were provided.
tools and techniques. Appreciated work has been done by the learner.
P6 Communicate appropriate recommendations as a Achieved The learner has generated valid, meaningful conclusions based
on the research findings. Appropriate recommendations have
result of research and data analysis to draw valid and meaningful been given.
conclusions.
M3 Evaluate the selection of appropriate tools and techniques for Achieved The learner has applied the different tools and techniques..
accuracy and authenticity to support and justify recommendations.
D2 Critically evaluate the research and data analysis tools used in Achieved The leaner has tried to provide evaluation and analysis related
to the project outcomes and reflected on how the project
the project development stages..
outcomes, the decision-making process and changes or
developments of the initial project management plan to
support justification of recommendations and learning during
the project. In here, if project outcome evaluates more deeply
and reflect how those outcome achieve and what are the
strength and weakness that leaner encounter during the
assignment process would be added more value.

NA
Managing A Successful Computing Project
Unit 06
Page | 16
LO4 Reflect on the value gained from conducting the project and its
usefulness to support sustainable organisational performance
P7 Reflect on the value of undertaking the research to meet stated Achieved . The learner has provided a sufficient discussion to meet the
objectives stated.
objectives and own learning and performance.

M4 Evaluate the value of the project management process and use Achieved The learner has evaluated the project management process and
research methods used with the project. Evaluation has been
of quality research to meet stated objectives and support own given on how the project management process has contributed to
learning and performance. meet the project objectives.

D3 Critically evaluate how the project supports sustainable Achieved The leaner has conducted a sufficient evaluation with
recommendations and action plan on how the project supports
organisational performance.
sustainable organisational performance.

NA
Managing A Successful Computing Project
Unit 06
Page | 17
Acknowledgment

I would like to express my deep gratitude to those who guide me and their valuable
contribution to accomplish this assignment on time. First I wish to thank my Lecture
Mr. Geeth Weerasinghe for his great support, perfect guidance, valuable supervision,
and encouragement in finishing this assignment. Last but not least, I would like to thank
all the classmates of my Batch 26 who helped me always and special thank for my
parents for their unlimited support.

Managing A Successful Computing Project


Unit 06

Page | 18
Table of Contents
Acknowledgment ............................................................................................................... 18

Task 01 ............................................................................................................................... 25

Executive Summary ........................................................................................................... 26

Introduction ........................................................................................................................ 27

Aims ................................................................................................................................... 28

Objectives........................................................................................................................... 28

Project Life Cycle .......................................................................................................... 28

Four Stages of the Project Life Cycle ........................................................................ 29

Project Scope ..................................................................................................................... 29

Work breakdown structure ................................................................................................. 31

Gantt chart .......................................................................................................................... 32

Cost Management Plan ...................................................................................................... 33

Cost of Quality (COQ) ....................................................................................................... 34

Communication Management Plan ................................................................................ 35

Project Communication Management Processes ........................................................... 35

 Communication Planning .................................................................................... 35

Tools Used ................................................................................................................. 35

 Distribute Information ......................................................................................... 36

 Performance Reporting ....................................................................................... 36

Risk Management Plan .................................................................................................. 36

Risk Register .................................................................................................................. 37

Probability/Impact Matrix .............................................................................................. 38

Managing A Successful Computing Project


Unit 06

Page | 19
Risk 3 ............................................................................................................................. 38

Risk 1 ............................................................................................................................. 38

Risk 2 ............................................................................................................................. 38

Risk 5 ............................................................................................................................. 38

Risk 4 ............................................................................................................................. 38

Resource Breakdown Structure ...................................................................................... 39

Task 02 ............................................................................................................................... 39

Source of Primary Research Data ...................................................................................... 39

What is a Primary Source? ......................................................................................... 39

What is a Secondary Source? ..................................................................................... 40

Literature Review ........................................................................................................... 40

Research Methodologies .................................................................................................... 41

Qualitative and Quantitative Research Methods ............................................................ 41

Quantitative Research Methodologies ........................................................................... 41

The reasons why Learner selected the survey method for research ........................... 42

Advantage of using a questionnaire ........................................................................... 43

Qualitative Research Methodologies ............................................................................. 49

Evidence for Interview ............................................................................................... 50

Sampling Techniques ..................................................................................................... 51

Probability Sampling Methods ................................................................................... 51

Non - Probability Sampling Methods ........................................................................ 54

What Learner used Sample Technique for research ...................................................... 55

Degrees of Reliability .................................................................................................... 56

Test-retest reliability .................................................................................................. 56

Managing A Successful Computing Project


Unit 06

Page | 20
Interrater reliability .................................................................................................... 57

Parallel forms reliability ............................................................................................. 57

Internal consistency reliability ................................................................................... 58

Ways to increase Reliability........................................................................................... 59

Degrees of validity ......................................................................................................... 59

Construct validity ....................................................................................................... 59

Content Validity ......................................................................................................... 60

Face Validity .............................................................................................................. 60

Criterion Validity ....................................................................................................... 60

Ways to increase Validity .............................................................................................. 61

Evaluation of the Project Management Process ............................................................. 61

Task 03 ............................................................................................................................... 62

3.1 Data Analysis Tools and Techniques ....................................................................... 62

Evidence of Analysis with Interpretation ....................................................................... 62

3.2 Conclusion ............................................................................................................... 71

Recommendations .......................................................................................................... 71

Action Plan ..................................................................................................................... 72

Evaluation of the selection of appropriate tools and techniques for accuracy &
authenticity ..................................................................................................................... 74

Task 04 ........................................................................................................................... 74

What is Reflection? ........................................................................................................ 74

Gibbs Model of Reflection ............................................................................................. 75

Experiential Learning Model ......................................................................................... 76

Schön Model .................................................................................................................. 77


Reflection of the project objectives and my own learning experience .......................... 78

Evaluation of project management process to meet the stated objective ....................... 79

Evaluation of how the project supports sustainability of the organization .................... 80

Page | 21
References ...................................................................................................................... 81

Managing A Successful Computing Project


Unit 06

Page | 22
Table of Figures

Figure 1: Project Life Cycle ............................................................................................... 28


Figure 2: Work Breakdown Structure ................................................................................ 31
Figure 3: Gantt chart .......................................................................................................... 32
Figure 4: Cost of Quality ................................................................................................... 34
Figure 5: Resource Breakdown Structure .......................................................................... 39
Figure 6: Questionnaire 1 ................................................................................................... 44
Figure 7: Questioner 1 ....................................................................................................... 45
Figure 8: Questioner 2 ....................................................................................................... 46
Figure 9: Questioner 3 ....................................................................................................... 47
Figure 10: Questioner 4 ..................................................................................................... 48
Figure 11: Questions of Interview...................................................................................... 50
Figure 12: Simple random sampling .................................................................................. 51
Figure 13: Stratified sampling ........................................................................................... 52
Figure 14: Single stage cluster sampling ........................................................................... 52
Figure 15: Two stage cluster sampling .............................................................................. 53
Figure 16: Systematic clustering ........................................................................................ 53
Figure 17: Multi stage sampling ........................................................................................ 54
Figure 18: Test-reset reliability .......................................................................................... 56
Figure 19: Interrater reliability ........................................................................................... 57
Figure 20: Parallel forms reliability ................................................................................... 57
Figure 21: Internal consistency reliability.......................................................................... 58
Figure 22: Data Analysis 1................................................................................................. 62
Figure 23: Data Analysis 2................................................................................................. 63
Figure 24: Data Analysis 3................................................................................................. 63
Figure 25: Data Analysis 4................................................................................................. 64
Figure 26: Data Analysis 5................................................................................................. 64
Figure 27: Data Analysis 6................................................................................................. 65

Managing A Successful Computing Project


Unit 06

Page | 23
Figure 28: Data Analysis 7................................................................................................. 65
Figure 29: Data Analysis 8................................................................................................. 66
Figure 30: Data Analysis 9................................................................................................. 66
Figure 31: Data Analysis 10............................................................................................... 67
Figure 32: Data Analysis 11............................................................................................... 67
Figure 33: Data Analysis 12............................................................................................... 68
Figure 34: Data Analysis 13............................................................................................... 68
Figure 35: Data Analysis 14............................................................................................... 69
Figure 36: Data Analysis 15............................................................................................... 69
Figure 37: Code 1 ............................................................................................................... 72
Figure 38: Code 2 ............................................................................................................... 72
Figure 39: Gibbs model of reflection ................................................................................. 75
Figure 40: Experiential learning model ............................................................................. 76
Figure 41: Schön Model ..................................................................................................... 77

Managing A Successful Computing Project


Unit 06

Page | 24
Task 01

Smart Hospital Using IoT

2021/04/01
Prepared By

Managing A Successful Computing Project


Unit 06

Page | 25
Executive Summary
The "Internet of Things" is a revolution for the ICT world. System components, networks
and devices are becoming autonomous and interconnected. When the technology
advances apply to healthcare sectors, the results are impressive. Communication
equipment change the way health care is managed, both in hospitals and among different
people in the world of the Healthcare industry. You can imagine an electronic device
collect data from patients’ vital signs becoming “smart”? Or could someone monitor
devices for life support to be able to respond to any changes in the situation? Connected
medical devices can bring increasing patient safety and efficiency, especially when it
comes to clinical information systems. When this applies to the entire healthcare
organization, it becomes a "Smart Hospital".
However, the increased flow of information in hospitals brings risks. Risks include
potential harm to patient safety or loss of personal health information and may not only
be caused by malicious actions, but also human errors, systems failures and natural
situations.
In this research, discusses about how Internet of Things (IoT) impact to healthcare
industry both positively and negatively. The first chapter of the study covers vital areas
such as research problem, objectives and aims, the literature based on academic findings
of past scholars, scope statement, work breakdown structure, Gantt chart, cost
management plan, quality management plan and risk management plan and
communication management plan.
Chapter two derives the methodology of how the data was collated. Both quantitative
survey and qualitative research approaches were taken into consideration to get accurate
information in this chapter.
The collated data was critically evaluated in chapter 3 to derive the impact of IoT to
healthcare sector both positively and negatively.
Recommendations were made based on the information gathered on the research topic.

Managing A Successful Computing Project


Unit 06

Page | 26
Introduction
The Internet of Things (IoT) is a new modeling technology that allows any object or
something to communicate with other things, services, or people through the Internet.
In this research, Learner expect to explore the benefits of IoT for the Healthcare sector in
Sri Lanka and challenges by using a survey with 35 responses and hope to gather data via
Interviews.
In Learner’s view, currently, there are so many problems that have occurred in the Sri
Lankan Healthcare sector due to lack of facilities and lack of technologies. IoT provides
various tools and resources to develop a healthcare system to provide patients with better
treatment and it will be cost-effective.
The introduction covers the social issue of the healthcare sector, aims and objectives,
research rationale, and limitations of the research.

Managing A Successful Computing Project


Unit 06

Page | 27
Aims Commented [sw1]: Aims and objectives are identified.

The main aim of this research is to introduce the IoT technology and explore the benefits
of IoT for health services in Sri Lanka to empower the overall healthcare management
practices and what are the most pressing challenges. As well as overcome those
challenges.

Objectives
 To learn what is IoT Commented [WA2]: IV – The learner has provided aims
and objectives
 To understand the current IoT trends in Sri Lanka
 To conduct an academic review on the IoT applications available in the world
 To understand whether IoT technology is frequent or rare
 To find what are the benefits of IoT
 To find what are the threats of IoT
 How to overcome threats of IoT
 To find are they are highly cost to overcome threats
 To find what are the best practices of low cost

Project Life Cycle

Figure 1: Project Life Cycle

Managing A Successful Computing Project


Unit 06

Page | 28
The project life cycle is a 4-step framework designed to help project managers manage
their successful projects from start to finish. The life cycle of the project aims to build an Commented [WA3]: IV- Project Management Life Cycle
was discussed
easy-to-follow foundation to manage projects.
Four Stages of the Project Life Cycle
1. The Project Initiation Stage: Understand the priorities, goals, deadlines,
risks of the project, Identifying deliverables, Identifying project
stakeholders

First identified research problems and aims, objectives, etc.


2. The Project Planning Stage: Outline tasks and timelines required to
perform the project
Learner has created project plan and planned the time frame and created a work
breakdown structure before starting the research. As well as estimated budget.
3. The Project Execution Stage: Turn learner’s plan into action and monitor
progress
Learner has organized tasks and started to gather data via google form and analyzed data.
4. The Project Closure Stage: Review conclusions, summarize study topics,
and plan other steps
Finally, Learner has able to make recommendations according to the data analysis.

Project Scope Commented [sw4]: Project scope could be elaborated


further
Project Scope Statement
Project Name Smart Hospital Using IoT
Project Sponsor Project Manager
Date of Project Approval 05/04/2021 Last Revision Date 30/06/2021
Scope Description In Scope:
 Explore the benefits of IoT for the healthcare sector
 Survey the interest of stakeholders regarding smart hospitals
using 35 people in the Gampaha District.

Managing A Successful Computing Project


Unit 06

Page | 29
 Interviews
 Find solutions for challenges

Out Of Scope:
 Gather details regarding all the things of IoT.

Project Deliverables  Identify the potential benefits of IoT for hospitals


 Identify the potential risks of IoT for hospitals
Acceptance Criteria Accept the benefits of IoT
Constraints The target community will not provide correct details
Assumptions The method that use for this research will not change within the
project duration.

Managing A Successful Computing Project


Unit 06

Page | 30
Work breakdown structure Commented [sw5]: WBS is clearly and comprehensively
done
The project tasks breakdown under four stages.

Figure 2: Work Breakdown Structure

NA
Managing A Successful Computing Project
Unit 06
Page | 31
Gantt chart
Project management timelines and tasks convert into a horizontal bar chart, displaying start Commented [sw6]: Gantt chart is presented succinctly

and end dates, as well as dependencies, schedules, and timelines, including the amount of
work completed in the phase.
To the left of the chart is a list of activities and at the top of a significant timeline. Each
action represents the bar. The position and length of the bar indicate the start date, duration,
and end date of the activity.

Figure 3: Gantt chart

NA
Managing A Successful Computing Project
Unit 06

Page | 32
Cost Management Plan Commented [sw7]: Cost plan is presented with budgeted
and actual amounts.

Project cost management is the cost of estimating, budgeting, and controlling costs over
the life of the project, to keep the expenses within the approved budget.
Therefore, cost management is one of the important pillars of project management and it
is significant regardless of the sector, whether manufacturing, retail, technology,
construction, etc. Project cost and revalue the situation if necessary.
Learner will expect to visit Radawana hospital and conduct a session for stakeholders and
after that hope to collect data via one-to-one interviews. The below table will show the
cost management initial plan for small-scale research.

Expenses Budgeted Amount Actual Amount


(Rs) (Rs)
1 Travelling 2000 0
2 Printing charges 1200 0
3 Projector 2000 0
4 Sounds 3000 0
5 Food 8000 0
6 Telephone / Internet 3000 5000
Final Cost 19,200 5000

Learner has estimated budget before starting the project. But learner had to change the
initial plan due to the Covid-19 pandemic situation in the country. Learner couldn’t visit
the expected hospital and moved to do an online survey by using a question form and have Commented [WA8]: Cost Management Plan was given
with justifications
to conduct interview via online. Therefore Learner had to spend only on Internet charges.

NA
Managing A Successful Computing Project
Unit 06

Page | 33
Cost of Quality (COQ)
Cost of Quality (COQ) is defined as a method that allows an organization to estimate how
much of the resources are used for inefficient prevention activities, appraise the quality
of organizational products or services, and that result from internal and external failure.
The availability of information allows an organization to determine the potential savings
that can be achieved through remedial measures.
The below diagram displays how the cost of quality will impact to the healthcare sector.
If they will use IoT devices for their activities, how it will be impacted to the relevant
society.

Figure 4: Cost of Quality

NA
Managing A Successful Computing Project
Unit 06

Page | 34
Communication Management Plan
Project communication management includes the process necessary to ensure that the
information needs of the project and its stakeholders are met through the development of
artifacts and the implementation of activities designed to achieve effective information
exchange.
Project Communication Management Processes
 Communication Planning
This is the first phase of the communication project for knowledge management. In the
process, a structured and useful program is developed for activities involved in
communication projects. It mainly makes use of information like the requirement of every
stakeholder and team, organizational assets available, and the project needs.

Tools Used
Learner has used online calls via SKYPE to communicate with stakeholders and created
a google form for the survey.

Description Frequency Method Audience Owner


Survey Daily Google Form Stakeholders Project
manager
Interview Every week Verbal Stakeholders Project
end manager
Session Monthly Google Stakeholders Project
Meeting manager

NA
Managing A Successful Computing Project
Unit 06

Page | 35
 Distribute Information

The distribution information process in the PMBOK Communication Management


System Project Information Management program involves the effective implementation
of the Communication Management Plan. Simply put, this is the system that meets the
communication needs of partners.
For example, A daily meeting is a type of communication. Learner has used some
communication methods in research such as email, Skype calls via the Internet.

 Performance Reporting
The report performance process includes monitoring performance, progress and providing
information about specific stakeholders. Variance analysis and forecasting methods, the
main tools and methods in the process. Others are communication methods and reporting
methods. The output of the project is the performance report.

Risk Management Plan Commented [sw9]: Risk management is presented


comprehensively with responsible person and mitigating
The process begins with stakeholders across the society to assess potential risks. Any action.

project has some risks. The risks of the project are the limitation of enough time, money,
volunteers, and critical situations of national politics.
If the Sri Lankan healthcare sector will use IoT devices for their work, it may occur some
risks. The below table will display those risks and mention how to mitigate them.

NA
Managing A Successful Computing Project
Unit 06

Page | 36
Risk Register

ID Risk Description Likelihood Impact if the Severity Owner Mitigating action


of the risk risk occurs
occurring
Risk 01 Lack of knowledge Medium High High Project Manager Train stakeholders
(Stakeholders don’t have
proper knowledge of IoT
devices)
Risk 02 Unauthorized access Medium High High Project Manager Secure network/ Access
control
Risk 03 High cost for maintainers High Medium Medium Project Manager Target problem areas
strategically.
Risk 04 Loss patient privacy Low High High Project Manager Firewall/ Strong passwords
Risk 05 System down time Low Medium Medium Project Manager Carefully test and schedule
major upgrades and new
implementations

NA
Managing A Successful Computing Project
Unit 06
Page | 37
Probability/Impact Matrix

Risk 3

High

Risk 1
Risk 2
Probability Medium

Risk 5 Risk 4

Low

Low Medium High


Impact Commented [WA10]: IV - Risk Management was applied
to the scenario

NA
Managing A Successful Computing Project
Unit 06
Page | 38
Resource Breakdown Structure
A Resource Breakdown Structure (RBS) can be defined as a model used to identify, list,
and segment the materials that are used to facilitate and complete a project.

Figure 5: Resource Breakdown Structure

Task 02
Source of Primary Research Data
When we do research, we have to gather information from different kinds of sources.

What is a Primary Source?


A primary source provides raw information and firsthand evidence. Examples include
interview data, statistical data, and artwork. This is the first foundation that contributes
directly to the topic of research.
The primary source is something that gives direct evidence about the people, events, or
signs you are taught. Primary is often the main focus of my analysis.
Learner has used some quantitive primary sources such as surveys, questioner.

NA
Managing A Successful Computing Project
Unit 06

Page | 39
What is a Secondary Source?
Secondary sources are obtained from second-hand data and information from other
researchers. Examples include author articles, reviews, and textbooks. A second
component defines, or compiles basic principles.
A secondary source is something that describes, interprets, evaluates, or evaluates
information on key topics.
Examples:
 Books, articles, and documentaries that regarding the information on a topic
 Synopses and descriptions
 Encyclopedias and textbooks
 Reviews and essays that evaluate or describe something

Learner has referred to Literature Reviews of the relevant topic to get research
knowledge.

Literature Review

From this point of view, the possibility of IoT has been described as a growth in health
research. These developments provide an excellent opportunity for health professionals
to quickly diagnose health issues and identify, treat and see patients in and out of the
hospital. As the use of technology-supported health services increases to enable health
systems to provide flexible models of care, an increasing number of traditional health
services will be strengthened or changed by the IoT. However, the implementation of IoT
in healthcare will rely on a clear and sound code of conduct for information management,
privacy, confidentiality, and the Internet regarding supply and demand. There are still
important opportunities for future research to discuss, associated with users of IoT
technology, healthcare, and IoT technology. Future research in IoT technologies is needed
to determine how to design IoT devices and regulatory models and communicate with
international and cross-state healthcare. More research is also needed on the effectiveness

NA
Managing A Successful Computing Project
Unit 06

Page | 40
of block chain storage compared to central cloud storage solutions supported by IoT
healthcare. From a healthcare perspective, there is a need for standardized guidelines for
medical prescriptions and a strong rule regarding payments for primary and secondary
services by the IoT. Finally, more research is needed to determine the acceptance and
numerical value of customers and hospitals in terms of IoT use to improve the delivery
and the overall quality of healthcare experiences. (https://www.jmir.org, n.d.)

Primary sources are more reliable, but good research uses both primary and secondary
sources.
As well as learner has referred some books such as “Learning Internet of Things” which
was written by Peter Waher. Learner has gain some knowledge through this book. But the
book has published few years ago. Therefore can’t apply their information for today. It’s
diffecult to get correct details through a book. So it’s better to move research
methodologis to get knowledge and accuratie information.

Research Methodologies Commented [sw11]: A range of research methodologies


are discussed and selected methodology is justified.

Qualitative and Quantitative Research Methods

When collecting and analyzing data, quantitative research is statistics and numbers, but
qualitative research competencies deal with words and meanings. Both are very important
to gain knowledge.

Quantitative Research Methodologies


 Survey Research
Survey Research is the most important tool for all research methods and analysis. Surveys
often posed questions in a sample of responses, using different methods such as online
polls, online surveys, questionnaires, online surveys, and so on.
NA
Managing A Successful Computing Project
Unit 06

Page | 41
There are two types of surveys.
1. Cross-sectional surveys
Cross-sectional surveys are conducted in situations when the researcher expects to collect
data from the population segment in a timely manner.

2. Longitudinal surveys
Longitudinal studies are observable, but unlike Cross-sectional surveys, longitudinal
studies are conducted at other long intervals to observe changes in respondents' behavior
and thinking.

 Correlational research
A comparison between the two organs is not uncommon. Correlational research is
underway to establish a relationship between close organelles and how they affect each
other and what changes are subsequently observed.

 Causal-comparative research
The research method depends on the comparison.
 Experimental research
The research method is also recognizing the actual model and relies on a theory. As the
name suggests, experimental research is often based on one or more theories.

I have decided to do survey research under quantitative research methodologies by using


35 stakeholders (Doctors, Nurses, Patients, and employees of healthcare) in the Gampaha
district of Sri Lanka and I’ll expect to conduct a survey through a google form.

The reasons why Learner selected the survey method for research
 Relatively easy to administer
 Cost-effective. Because learner has conducted the survey via Google form
 Can collect data from a large number of respondents

NA
Managing A Successful Computing Project
Unit 06

Page | 42
 Numerous questions can be asked about IoT, giving extensive flexibility in data
analysis

 Questionnaire
A questionnaire is a research tool that consists of a series of questions for the purpose of
collecting information from respondents. Asking questions can be considered as a type of
written interview. It can be done on the phone, computer, or mail.

A questionnaire provides a much cheaper, faster, and more efficient way to obtain large
amounts of information from a large sample of people.
Information can be gained quickly because the researcher is not required after questioning.
This is useful for the population if interviews are not effective.

However, a problem with the questionnaire is that respondents may lie because of the
general need. Many people want to show a good image of themselves and may lie or
distort the truth to look good.

Questionnaires can be a good way to measure behavior, attitudes, interests, opinions, and,
hopefully, a large number of subjects cheaper and faster than other methods.

Advantage of using a questionnaire


1. Economical:
This is a better way to gather information. It's both economical for the sender and for the
response time, effort and cost. The costs of performing surveys with the help of a
questionnaire are very low. You do not have to visit people. And it does not require many
costs for conducting the search.

2. Wide Coverage

NA
Managing A Successful Computing Project
Unit 06

Page | 43
This may be the best way to gather information, compared to other methods like
interviewing or observation, when the general population is spread over much of your
territory. This allows a national or international publication.

3. Rapidity
Answers can be quickly found by asking questions. In this case, you have nothing to do
to visit the person who has resisted or to continue the investigation for a long time. Thor
"First in comparison with other methods, the Google query form is the fastest way.

4. An Easier Method
The questionnaire is a simple comparison of ways to design, build and manage. It does
not require many special skills or knowledge.

5. It Puts Less Pressure on the Respondents

It takes less pressure on the respondents for immediate response. . He may answer in his
own spare time, but the interview or observation requires establishing time and conditions.

Learner has created a sample questionnaire by using Google form to collect data.

NA
Managing A Successful Computing Project
Unit 06

Page | 44
Figure 7: Questioner 1

NA
Managing A Successful Computing Project
Unit 06

Page | 45
Figure 8: Questioner 2

NA
Managing A Successful Computing Project
Unit 06

Page | 46
Figure 9: Questioner 3

NA
Managing A Successful Computing Project
Unit 06

Page | 47
Figure 10: Questioner 4

NA
Managing A Successful Computing Project
Unit 06

Page | 48
Qualitative Research Methodologies
 Observations
Observation, as the name suggests, is a method of gathering information through
observation. Observation is a data collection method that can be structured or
unstructured. In structuring our effective classification of data, the collected data are
analyzed with specific variables and according to a preliminary classification.
Unstructured observation, on the other hand, is performed in an open and free system in
the sense that there will be no pre-planned changes or goals.
Advantages of the observation data collection method include direct use of risk analysis,
high levels of flexibility in terms of application, and the construction of a permanent
record of phenomena that should be referred to later. At the same time, observation
methods are ineffective with long-term requirements, high envy levels, and the impact of
observers on initial data, in a way that the participation of observers may be affected in
the behavior of elements.
Learner has used the unstructured observation method to identify research problems. This
method was very helpful to gain knowledge regarding the healthcare sector’s issues.

 One on One Interview


When planning an interview schedule, it is important to ask questions that can provide a
lot of information about the potential study and can also discuss the aims and objectives
of the study. In a qualified interview, good questions should be open-ended (i.e. requiring
more than yes / no answers), impartial, sensitive, and understanding. It is usually best to
start with questions that participants can easily answer and then move on to more complex
or sensitive issues. This can help calm the respondents, create trust and communication
and often generate rich information which later reveals the interview.
As mentioned in the Initial plan of research, couldn’t arrange interviews physically due to
the country situation. But interviewed Dr. Damith Abesuriya who is an MBBS doctor at
Radawana Hospital via Skype. It is easy to get real thoughts regarding IoT via interviews.

NA
Managing A Successful Computing Project
Unit 06

Page | 49
It is a completely conversational method. So it was easy to get information about IoT. It
is an advantage that can get more information within less time.
Learner has asked 10 questions from the interviewee.

Figure 11: Questions of Interview

Evidence for Interview

NA
Managing A Successful Computing Project
Unit 06 Commented [WA12]: IV – Evidences were provided

Page | 50
 Focus Groups
Particular emphasis is on a type of group discussion that emphasizes communication
between research analysts to obtain information. Although group interviews are often
used as a quick and convenient way to collect data from multiple people at the same time,
group interviews explicitly use group linking as a methodological approach. That is,
instead of the researcher asking people to answer a question, it encourages people to talk
to each other: ask questions, share backgrounds and explain each other's perspectives and
points of view. And can be used to examine not only what people think, but how they
think and why they think so.
 Ethnographic Research
 Record Keeping


Sampling Techniques
Sampling is very useful in research. One of the best important factors to determine the
accuracy of the Research/study results.
If there is something wrong with the selected sample, it will show up directly in the final
result. There are many methods to help us set expectations depending on need and situation.
Probability Sampling Methods
This model uses randomization to ensure that all elements of the population have the same
opportunity to be a part of the selected model.
 Simple random sampling
In this case, each individual is selected to a position and each member of the population
has an equal opportunity, or probability, to be selected. One way to get a random sample
is to assign each person a population of a number and use a table of numerical numbers
to determine which people to include.

NA Figure 12: Simple random sampling


Managing A Successful Computing Project
Unit 06

Page | 51
 Stratified Sampling
The method divides the elements of the population into small subgroups (strata) based on
the similarity so that elements in the group are similar and heterogeneous among other
constructed subgroups. And the elements are randomly selected from each of the scales.
First, have information about the population to form small groups.

Figure 13: Stratified sampling

 Cluster Sampling
Our whole population is divided into clusters or segments and clusters are selected. All
elements of this cluster are used for simulations. The clusters indicate using details like
age, gender, location, etc.
Cluster sampling can be categorized into the following ways.
I. Single Stage Cluster Sampling
The whole cluster was selected randomly for sampling.

Figure 14: Single stage cluster sampling

NA
Managing A Successful Computing Project
Unit 06

Page | 52
II. Two Stage Cluster Sampling
First, we randomly select clusters and then from the selected clusters randomly select
elements for sampling.

Figure 15: Two stage cluster sampling

III. Systematic Clustering


The selection of elements is systematic and not random except for the first element.
Element is a pattern that is selected during normal population periods. All elements are
grouped in the first order that each element has the same selection chances.

Figure 16: Systematic clustering

NA
Managing A Successful Computing Project
Unit 06

Page | 53
 Multi-Stage Sampling
This is the combination of the above methods. The population is divided into several
clusters and then the clusters are further subdivided and grouped into smaller clusters
(shelves) based on uniformity. One or more clusters can be randomly selected from each
layer. The process continues until the cluster can no longer split. Commented [WA13]: IV – Theories were applied in the
assessment

Figure 17: Multi stage sampling

Non - Probability Sampling Methods


It does not stand on randomization. The method is more dependent on the qualified
researcher who selects elements for a sample. The results of these models may be biased
and make it difficult for all elements of the population to be part of the same model. This
type of simulation is also called non-specific simulation.
 Convenience Sampling
This model is based on availability. This method is used when samples are rare and too
expensive. And based on the simplicity of the selected models.

 Purposive Sampling
This is based on the purpose of the study. Only those elements will be selected from the
population that fits the best purpose for our study.

NA
Managing A Successful Computing Project
Unit 06

Page | 54
 Quota Sampling
This type of sampling is expected to be the first standard. The candidate is selected from
the population. The determination of traits/characteristics in the model should be
consistent with the population. Elements are selected unless the correct classification of
certain types of information is obtained or enough data into different categories to be
collected.
 Referral /Snowball Sampling
The method is used in situations that are severely undetectable and sparsely populated.
Therefore, we will take the help of the first element that we have selected for the
population and ask him to offer other elements that will fit in the description of the desired
model.
And this roadblock continues, increasing the population like a snowball.

What Learner used Sample Technique for research


Learner has decided to choose the Simple Random Sampling technique under probability
sampling by using around 35 stakeholders in the Gampaha district of Sri Lanka.
Advantages of Simple Random Sampling
 Lack of Bias
Since each person comprises the larger group chosen among the followers, each person in
the largest number of sets has the same opportunity to be selected. In many cases, this is
a subset scale that is the most potential for representation of the entire group.

 Simplicity
As its name suggests, performing a simple simulation is less difficult than other methods.
As mentioned, each member of the group is randomly selected and there are no additional
steps.

NA
Managing A Successful Computing Project
Unit 06

Page | 55
Degrees of Reliability
Reliability indicates whether we get the same results through a tool to measure more than
one object. In simple terms, reliability is the degree to which methods are taught to achieve
stable and lasting results.

A standard model is considered reliable if the application on the same scale number of
times gives the same results.

There are four main types of reliability.


Test-retest reliability

Figure 18: Test-reset reliability

Test-reset reliability measures the stability of results when the same test is repeated on the
same sample in different directions at different times. It needs to be used when we
measure something that is expected to remain stable in the sample.
To measure test-reset reliability, the same test must be performed on the same group of
people at two different points at the same time. Then determine the correlation between
the two sets of results.

NA
Managing A Successful Computing Project
Unit 06

Page | 56
Interrater reliability

Figure 19: Interrater reliability

Interrater reliability (Also known as interobserver reliability) measures the degree of


agreement between different people observing or evaluating similarities. It is used when
the data is compiled by researchers to assign categories, grades or classes to one or more
variables.
To measure interrater reliability, different researchers administered the same
measurement or looked at similar samples. Then determine the correlation between very
different results. If all samples give the same values, the test is called high interrater
reliability.

Parallel forms reliability

Figure 20: Parallel forms reliability

NA
Managing A Successful Computing Project
Unit 06

Page | 57
Parallel forms reliability measures the relationship between two similarities as a test. It
can be used when we have different tools for two assessments or questions that are
designed to measure the same thing.

The most common way to measure the reliability of the parallel form is to generate a large
number of questions to estimate the same number and separate the two questions.

The same set of responses answered all sets and determined the relationship between the
results. Elevation coordination between the two high-speed indicators is similar evidence.

Internal consistency reliability

Figure 21: Internal consistency reliability

Internal consistency the relationship between multiple items in a test that aims to measure
construct similarity.

Internal consistency can be determined without repeating the test or involving other
researchers, so it is a good method to evaluate reliability when there is only one data set.
There are two methods to measure internal consistency.
 Average inter-item correlation
For a set of measures created to evaluate the same construct, calculate the correlation
between the results of all six pairs of items and then determine the average.

NA
Managing A Successful Computing Project
Unit 06

Page | 58
 Split-half reliability
Divide a set of measures into two sets randomly. After researching the entire set of
respondents, determine the relationship between the two sets of responses.

Ways to increase Reliability


 If another person will conduct the same type of research for the same topic, the
output may be the same.
 Learner can give own data set to another researcher who is interested in this topic
for his reference.
 If another person will conduct the same research in a different time range, the
output may be the same.
 Learner has increased the number of items (Ex: Survey/ Online Interview)
 Calculation of internal consistency, for example by two different questions with
the same focus.
 If learner do the same research in different time ranges, then the result may be the
same.

Degrees of validity
The validity of the research findings is driven by some different factors, including the
selection of samples, the researchers, and the design of research equipment. Validity
should be seen as a continuum with the ability to improve the validity of the findings in a
study, but 100% proof cannot be achieved.
There are four main types of validity.
Construct validity
Construct validity describes the effectiveness of a test or model to achieve its claims. A
test designed to measure grief should only measure the specific construct and not close
related concepts like anxiety or worry.

NA
Managing A Successful Computing Project
Unit 06

Page | 59
Content Validity
Content Validity refers to the degree to which the research instrument is applied, and
instead of the structural structure, it is designed to measure.
The content validity is determined by whether a test is representative of all aspects of the
construction.
To get valid results, the content of the test, study or measurement method must cover all
relevant aspects of the topic that he or she intends to measure. If some components are
missing in the measurement (if important aspects are not included), the validity is
threatened.

 Learner has used valid sources such as Journal articles for the research.
 Learner has selected a suitable audience for research. According to the topic
“Smart Hospital Using IoT” the audience should be Doctors, Nurses, Employees
of the healthcare sector, and patients.
 The chosen methodologies such as surveys and online interviews appropriate for
the research.
 Learner has planned proper tools such as Google form to gather data.
 In the end, the data analysis stage avoided researcher bias and be rigorous in the
analysis of the data.

Face Validity
Face validity is a measure of how well a member of a research project is at face value and
whether it is a good project.

Criterion Validity
Criterion validity is measuring the effectiveness of one measure to predict an outcome for
another measure. A test with this type of evidence if it helps predict actions or behaviors
in another context.

NA
Managing A Successful Computing Project
Unit 06 Commented [WA14]: IV – Reliability and Validity of the
research was discussed accordingly.

Page | 60
Ways to increase Validity
 Plan carefully and implement of design
 Search discrepant evidence and negative cases
 Develop operational definitions.

Evaluation of the Project Management Process


Learner was able to fulfill every task of research successfully according to the project
management process. Learner think that has got a good approach for this research and
learner has used proper research methodologies such as surveys and interviews over the
phone. Learner has received around 35 responses to the survey. But was unable to gain a
large scale of knowledge through the survey than expected.
When learner was doing this research learner had to face so many barriers such as the
Covid-19 pandemic situation in Sri Lanka. Rather than doing an online survey, it’s better
to collect data after visiting relevant people and explaining to them about IoT. If learner
was able to visit their results might be better. Because most people don’t have a clear idea
about IoT devices and they have to lack technical knowledge. If learner was visiting, then
would be able to show some videos and explain clearly according to their knowledge and
as a solution for lack of technical knowledge, learner would be able to fill the form by
herself. Another biggest problem is the language barrier. As learner noticed most people
don’t have proper knowledge of English. They are difficult to understand what she mean.
Because some of them have given wrong answers to questions. So If learner could visit
them, learner would be able to explain in the Sinhala language to get a better answer from
them. And another barrier was that it was a very time-consuming method. When learner
was gathering data through the online survey, the majority of people was taking so many
days to submit the form. If learner could able to visit them, learner would be able to save
time a lot.
Learner has used another good research methodology such as Online Interviews. Learner
was learning new things via interviews. But it’s better to do good research than if learner

NA
Managing A Successful Computing Project
Unit 06

Page | 61
could conduct the interviews face to face. But learner was unable to arrange interviews
due to bad situation of the country. It was a huge barrier for this research as think.
Even though there are so many barriers, the research was completed successfully.

Task 03
3.1 Data Analysis Tools and Techniques Commented [sw15]: Data is analysed and findings are
presented succinctly.
Mainly learner has used the google form analysis tool to analyze data and learner was able
to get 35 responses in the Gampaha district.

Evidence of Analysis with Interpretation

Figure 22: Data Analysis 1

Learner has received 35 responses to questioner. They all are in the Gampaha district.

NA
Managing A Successful Computing Project
Unit 06

Page | 62
Figure 23: Data Analysis 2

The above pie chart represents the percentage of stakeholders ‘roles who were participated
in the survey. A blue color circle might display the number of doctors, the orange circle
displays the number of nurses, the yellow circle displays the number of other employees
of the healthcare sector, and the green circle displays the number of patients. It’s clear
from the information given in this pie chart that patients are the most participated
stakeholder for this survey.

Figure 24: Data Analysis 3

It’s very clear the information given in this pie chart that most participated age range
taking this survey was below 31. But other age range 31-40 also has participated
significant percentage.

NA
Managing A Successful Computing Project
Unit 06

Page | 63
Figure 25: Data Analysis 4

The evidence from this pie chart shows that most people have heard about IoT already.
However, some of them still don’t have an idea about IoT.

Figure 26: Data Analysis 5

Evident in the bar chart here that learner can get an idea that how people think regarding
the healthcare monitoring system. A significant number of people have agreed to use
healthcare monitoring systems using IoT. On the other hand, some of them have confused
to use yet IoT devices.
NA
Managing A Successful Computing Project
Unit 06

Page | 64
Figure 27: Data Analysis 6

According to this pie chart most of them has accepted IoT healthcare as the future of
digital health. It means most of them are willing to move to the digitalization in future.
But few of them are not ready to move for it.

Figure 28: Data Analysis 7

As shown in this pie chart the majority of people think IoT healthcare services will reduce
the cost and enrich the user’s experience. But some of them have a doubt above mentioned
matter.

NA
Managing A Successful Computing Project
Unit 06

Page | 65
Figure 29: Data Analysis 8

As shown here 80% of people have thought that wearable devices would be a benefit for
healthcare services. It will be a great approach for IoT devices and this result gives me a
good understanding that how people think about the benefits of IoT. But few of them
don’t have a clear idea about that.

Figure 30: Data Analysis 9

The pie chart shows current media in Sri Lanka are not enough to deliver the information
of IoT. That is a huge problem in Sri Lanka and difficult to get knowledge regarding IoT.
Very few of them think that media deliver enough information among people.

NA
Managing A Successful Computing Project
Unit 06

Page | 66
Figure 31: Data Analysis 10

The evidence from this pie chart shows that 48.6% of people have thought remote surgery
using IoT is an effective thing for the healthcare sector. But similarly, 42.9% of people
have thought it would be a risk. That means most of them have not readied to accept yet
innovative ideas.

Figure 32: Data Analysis 11

This graph shows that how people are confused to use IoT devices. Because of the security
issues. As shown, the majority of people have confused to use them. Just 28.6% of people
didn’t see the risk of IoT devices. According to this, it is clear that many users of IoT
devices are confusing to use IoT devices.

NA
Managing A Successful Computing Project
Unit 06

Page | 67
Figure 33: Data Analysis 12

From the information shown in this pie chart, a large number of people are preferring to
adopt the new technology of IoT. But some of them are not ready to adopt it. According
to this, learner can probably expect to see more and more people using IoT devices in the Commented [WA16]: IV – Analysis was conducted
accordingly
future.

Figure 34: Data Analysis 13

According to the above answers, the majority of people think that IoT devices would be
improved the effectiveness of the healthcare sector. But few of them haven’t a clear idea
about that.

NA
Managing A Successful Computing Project
Unit 06

Page | 68
Figure 35: Data Analysis 14

According to the above answers, the majority of people see security threats when using
IoT devices. They are confusing to use IoT devices because of the security breaches such
as unauthorized access, the privacy of health data. Not only that but also they doubt the
accuracy of data. Very few of them not mentioned any issues of IoT.

NA
Managing A Successful Computing Project
Unit 06

Page | 69
As the solutions of security issues of IoT, majority of people have responded some
solutions such as secure network, strong password, firewall, etc. But some of them have
avoided answering this question.

NA
Managing A Successful Computing Project
Unit 06

Page | 70
3.2 Conclusion
In this research, (Smart Hospital using Internet of Things (IoT) the main aim has been
successfully met. Furthermore, learner was able to explore the benefits of IoT as well as
identify the most pressing challenges through this small-scale research.
According to the data analysis of the survey, most of them have a clear idea about IoT and
they are willing to adopt IoT, and the majority of people have seen benefits of IoT such
as the effectiveness of the healthcare sector and enrichens of user experience. Especially
they are more interested in healthcare monitoring systems and wearable devices. Not only
that but also most people prefer to get an experience with innovative IoT devices.
However, even though there are a lot of benefits of IoT, few of them are confused to use
IoT devices. Because of the security issues such as unauthorized access, data breach, the
privacy of biological data, etc. And also a significant number of people doubt the accuracy
of data which is generated by IoT devices. According to their answers, very few of them
haven’t idea about IoT. That would be a huge problem in the future.
So in learner’s view, can conclude research based on the 35 responses that the majority of
people in Sri Lanka are willing to adopt IoT and learner think that people will try to use
IoT devices more and more in the future. Thereby they would be able to do their day-to-
day activities effectively and efficiently than before. According to the analysis, learner
expect most of the people would be preferred to digitalization with IoT in another few
years.

Recommendations Commented [sw17]: Recommendations are valid

According to the responses of the survey that learner was able to identify so many pressing
challenges regarding IoT. As shown in data analysis, significant people are confused to
use IoT devices due to security issues such as unauthorized access, hackers, steal data or
harm data, and having an unsecured network.

NA
Managing A Successful Computing Project
Unit 06

Page | 71
In addition, learner has interviewed via Skype with Dr. Damith Abesuriya who is an
MBBS doctor at Radawana Hospital. Learner asked some questions from him regarding
IoT and how it will be impacted to the healthcare sector in Sri Lanka.
Below mentioned some of his special codes.

Figure 37: Code 1

Figure 38: Code 2

According to his codes, he has mentioned some actions to prevent security issues.
So learner expect to suggest an action plan to overcome the threats through this
recommendation.

Action Plan
 Install and monitor firewall performance
A firewall is a component or set of programs or hardware designed to block unauthorized
access to computers and networks. In simple terms, a firewall is a set of rules that regulate
the entry and exit of communications. Computers and networks that "follow the rules" are
allowed on the site, and those are not exempt from accessing the system.

NA
Managing A Successful Computing Project
Unit 06

Page | 72
Firewalls are starting to get more complicated (right along with hackers) and the
innovation is incorporating standard safety networks covering multiple platforms and
encryption methods, all working together to prevent a breach.

 Update Passwords At Least Every Quarter


Need to train stakeholders to avoid use default passwords “12345” and their dates of birth.
In addition, need to create passwords with letters, numbers, symbols, and some uppercase
letters with nine digits at least.

 Create A Virtual Private Network (VPN)


VPNs create a more secure connection between IoT devices and servers. The networks
only require access for users to access our systems, including our wireless network, and
devices authorized in our network settings. A VPN can greatly reduce the likelihood that
hackers will gain access to a wireless network and compromise the system.

 Train stakeholders
Need to all stakeholders in the healthcare sector are used to follow computer security best
practices. Regular reminders about potential risks and steps to mitigate them will help to
maintain a secure network.

 Shut Down devices When Not in Use


When devices stay idle at night while connected to the company's network, they become
more visible and accessible to hackers. By shutting down devices, they restrict their access
to their website.

 Secure Personal Devices


These days many users use their smartphones and other personal devices to access
information at the organization. Need to consider implementing a policy for using
personal devices to ensure individuals are following security protocols. There are some

NA
Managing A Successful Computing Project
Unit 06

Page | 73
quick tips for securing personal health data and sensitive data include never using
unsecured public Wi-Fi and turning off Bluetooth if not need etc.

If stakeholders of the healthcare sector will apply the above-mentioned recommendations,


it’s easy to mitigate the risks of IoT and people can use IoT devices without any doubt.

Evaluation of the selection of appropriate tools and techniques for


accuracy & authenticity Commented [sw18]: Self-reflection is comprehensively
presented with application relevant theories and models
Learner has used google form as an appropriate tool for the research. Rather than using a
google form, it was better to use statistical software such as SPSS or SAS for the data
analysis. Then it would be ensured the accuracy of the analysis.
As well as if learner used more respondents over 35, the results might be accurate more.
And also it’s better to participate stakeholders from another two or three districts in Sri
Lanka, results would be better and accuracy would be high.
And also if learner could collect data from people who have different thinking pattern,
recommendation and authenticity would be better. Moreover, we can get more accuracy
of data and authenticity by collecting data from different industries.

Task 04
What is Reflection?
Reflection is a metacognitive procedure, which means it involves thinking about our
thoughts. This is a form of analysis with a focus on me, my thinking, behavior, and
actions.

NA
Managing A Successful Computing Project
Unit 06

Page | 74
Gibbs Model of Reflection

Figure 39: Gibbs model of reflection

American sociologist and psychologist Graham Gibbs published his Reflective cycle in
1988. Learner can think critically with own experience via this Gibbs Reflective Cycle.

Gibbs' reflective cycle begins with the Description and then continues clockwise to
Feelings, Evaluation, Analysis, Conclusion and ends with the action plan and back to the
description. (toolshero.com, n.d.)

NA
Managing A Successful Computing Project
Unit 06

Page | 75
Experiential Learning Model

Figure 40: Experiential learning model

David A. Kolb's experiential learning theory which is strong approach for any kind of
learning, development and changes. Furthermore, it is describes the quality of learning
and encourages to learn new things.
Learning happens in any stage of life and it is very important to solve problems, make
decisions and face challengers.
The experiential learning cycle is a four-step learning process.
(https://educationaltechnology.net, n.d.)

1. Concrete Experience
2. Reflective Observation
3. Abstract Conceptualization
4. Active Experimentation

NA
Managing A Successful Computing Project
Unit 06

Page | 76
Although these steps helps to make learning path together, some people needs more
components than others. Therefore Roger Fry and Kolb have identified four unique
learning styles.

1. Diverging (concrete experience/reflective observation)


2. Assimilating (abstract conceptualization/reflective observation)
3. Converging (abstract conceptualization/active experimentation)
4. Accommodating (concrete experience/active experimentation)

Schön Model

Schon method was introduced in 1987. The Schon Model has compared three versions of
reflective practice. It includes knowledge of professionals. Thereby user can understand
via others perspective as well.

Schon has mentioned that reflective practice is a talent which can be used for future
improvements with new methods. Commented [WA19]: IV – This section was discussed
holistically by the learner.

Figure 41: Schön Model

NA
Managing A Successful Computing Project
Unit 06

Page | 77
The first type of reflection is 'reflection-on-action. That happens with past experience and
it analysis what happened during the experience and if again face for the situation, consider
about user doing differently.

The second type of reflection is 'Reflection-in-action'. It reflects during the actual


situations. If any experience will occur unexpectedly, user needs to decide how to behave
and as the result of this the chosen task would happen immediately. .
(https://thecvmethod.wordpress.com, n.d.)

Reflection of the project objectives and my own learning experience

Research becomes successful when it gets properly planned with the pre-set objectives.
This research has been aligned effectively with its aims. The main aim was that explore
the benefits of IoT and the most pressing challenges and how to overcome them within
three months. Learner was able to reach to project aims successfully. Because learner has
done every task according to the project management plan. According to the data analysis,
was able to identify the benefits of IoT and also the issues of IoT. Moreover, learner
learned how to overcome those issues through this research. Learner think it will be a
great approach for the sustainability of the healthcare sector in Sri Lanka. As well as
learner was able to fulfill project objectives very easily.

Learner has collected knowledge and experience during this project and it would be a
great experience to manage a project successfully in the future too. Learner has planned
the most suitable research methodologies, interpreted and analyzed data through a survey.
This research also improved learner’s resource management capability.
Learner has studied different sources such as journal articles, books, methods, and theories
and learner’s skill and knowledge were developed by those things. But learner has realized
the theoretical knowledge is not enough for learning and needs to apply in a practical way

NA
Managing A Successful Computing Project
Unit 06

Page | 78
for better education. There was a limited period to conduct this research. So learner had
to plan every task within that period. It was easy to manage the time because of the Gantt
Chart and this has increased time management skill.
During the whole project, learner was learned new things daily like time management,
gain knowledge, meeting new people and gain knowledge from them, and problem-
solving skills. The knowledge of such experience sharing helps a lot in future when we
have to face real problems and tackle them immediately.
And also learner was able to succeed than thought because of the hard work. Hard work
is the key to success and if we didn’t work hard then we couldn’t complete this project as
expected. Learner has created a project plan and followed each task according to that. But
learner had a lot of challenges and difficulties managing time for research. The hardest
part was gathering data for the research. Somehow learner was able to manage those
challenges successfully.
Overall the project has benefitted learner and the healthcare sector as well.

Evaluation of project management process to meet the stated


objective
Research has become successful when it gets properly aligned with pre-set objectives.
The main objective of the research was to find the benefits of IoT. Learner think that was
able to find so many benefits of IoT and how people think about IoT etc through the
survey. Most people were willing to adopt IoT and they have mentioned it would be
helpful for their work effectively. Furthermore, they like to take it positively. Learner has
learned so many new things through this research.
Another main objective was to find the most pressing challenges regarding IoT. Learner
has identified a lot of issues such as security issues, unauthorized access, the privacy of
data, the accuracy of data, etc. Learner was able to develop own skills and knowledge
through this research.

NA
Managing A Successful Computing Project
Unit 06

Page | 79
Finally, Learner found solutions for the issues. According to the research analysis and
other sources, Learner has identified some solutions such as implementing a secure
network, using a strong password, using a firewall, providing technical knowledge, etc.
As well as Learner has identified what are the best practices of low cost. In learner’s view,
the research has successfully met the stated objectives.

Evaluation of how the project supports sustainability of the


organization

After the successful completion of the project, learner has identified some areas for the
sustainability of the healthcare sector in Sri Lanka. The Smart Hospital concept will be a
great advantage for the future performance of the healthcare sector in Sri Lanka.
Undoubtedly, the Internet of Things technology has radically transformed the healthcare
service by redesigning the way devices, software and users communicate and connect for
the delivery of healthcare services. IoT continues to introduce new tools and capabilities
such as IoT that enable physicians to develop software developers to build an integrated
healthcare service with the vision of ensuring better patient care at reduced costs.
Therefore, there are a lot of opportunities that clinicians and health professionals can
consider when improving support in working methods. For example, many hospitals use
IoT for humidity control and asset and temperature management in operating facilities. In
addition, IoT applications offer many benefits for healthcare providers and patients to
improve healthcare services.
It will easy to improve their efficiency via Real-Time remote monitoring systems, Blood
pressure monitoring, and smartwatches. Not only that but also reduced the risk of error
and miscalculation due to the human factor, normally doctors spend a lot of time
processing some information. But with IoT, it will be taken few minutes.
Finally, the research has supported the sustainability of the healthcare industry in Sri
Lanka.

NA
Managing A Successful Computing Project
Unit 06

Page | 80
References

Kelly, J., Campbell, K., Gong, E. and Scuffham, P., 2020. The Internet of Things: Impact
and Implications for Health Care Delivery. Journal of Medical Internet Research, 22(11),
p.e20135.

toolshero. 2021. Gibbs Reflective Cycle by Graham Gibbs. [online] Available at:
<https://www.toolshero.com/management/gibbs-reflective-cycle-graham-gibbs/>
[Accessed 8 July 2021].

Kurt, S., 2021. Kolb’s Experiential Learning Theory & Learning Styles - Educational
Technology. [online] Educational Technology. Available at:
<https://educationaltechnology.net/kolbs-experiential-learning-theory-learning-styles/>
[Accessed 8 July 2021].

The CV Method. 2021. Reflective Practice – Schon. [online] Available at: Commented [WA20]: Should have provided more
references.
<https://thecvmethod.wordpress.com/2016/10/24/398/> [Accessed 8 July 2021].

NA
Managing A Successful Computing Project
Unit 06

Page | 81

You might also like