Web Project Development: Emergency Management
DOI:
https://doi.org/10.13052/jwe1540-9589.2182Keywords:
web project, project management, member, social network, emergency management, web, data manipulation, data analysisAbstract
Web projects are crucial to a company’s online presence and significantly impact its success. Risk management is a component of web project management to identify, assess and potentially control threats to the success of projects. The research methodology includes systematic and analytical analyses of the members’ management of risks associated with web project users. The results and implications reveal that assessing the intensity of risk management measures for the sustainability of web projects regarding risks is imperative. The capacity for emergency management in web projects is essential for identifying, assessing, and controlling potential threats, reducing the probability of project delays or failure. Emergency management offers several critical benefits to web projects, including improved data protection, increased continuity of operations, reduced downtime, enhanced reputation, and increased efficiency. Effective emergency management throughout the web project life cycle organization ensures that the project is completed on time, within budget, and to stakeholders’ satisfaction while being prepared for potential emergencies. This research develops best practices and standards for future projects, increasing project success rates.
Downloads
References
C. White, L. Plotnick, J. Kushma, S. R. Hiltz, M. Turoff, “An online social network for emergency management.” International Journal of Emergency Management, vol. 6, no. 3–4, pp. 369–382, 2009. DOI: 10.1504/IJEM.2009.031572.
R. Dandage, S. Mantha, S. Rane, “Modelling human resource dimension of international project risk management.” Journal of Global Operations and Strategic Sourcing, vol. 14, no. 2, pp. 261–290, 2021. DOI: 10.1108/JGOSS-11-2019-0065.
A. Barone, “Learn about our editorial policies digital marketing overview: Types, challenges, and required skills.” (Accessed June 2022). https://www.investopedia.com/terms/d/digital-marketing.asp.
P. Ferreira de Araújo Lima, M. Crema, C. Verbano, “Risk management in SMEs: A systematic literature review and future directions.” European Management Journal, vol. 38, no. 1, pp. 78–94, 2020. DOI: 10.1016/j.emj.2019.06.005.
B.-C. Kim, “Dependence modeling for large-scale project cost and time risk assessment: Additive risk factor approaches.” IEEE Transactions on Engineering Management, vol. 70, no. 2, pp. 417–436, 2021. DOI: 10.1109/TEM.2020.3046542.
B. Kim, “Multi-factor association dependence modelling for project risk analysis.” MethodsX, vol. 8, p. 101443, 2021. DOI: 10.1016/j.mex.2021.101443.
M. Asadabadi, O. Zwikael, “Integrating risk into estimations of project activities’ time and cost: A stratified approach.” European Journal of Operational Research, vol. 291, no. 2, pp. 482–490, 2021. DOI: 10.1016/j.ejor.2019.11.018.
J. Alves, E. Ferreira, J. de Nadae, “Crisis and risks in engineering project management: A review.” Brazilian Journal of Operations & Production Management, vol. 18, no. 4, pp. 1–17, 2021. DOI: 10.14488/BJOPM.2021.026.
S. Alirezaei, H. Taghaddos, K. Ghorab, A. Tak, S. Alirezaei, “BIM-augmented reality integrated approach to risk management.” Automation in Construction, vol. 141, p. 104458, 2022. DOI: 10.1016/j.autcon.2022.104458.
K. Buganova, J. Simickova, “Risk management in traditional and agile project management.” Transportation Research Procedia, vol. 40, pp. 986–993, 2019. DOI: 10.1016/j.trpro.2019.07.138.
T. Raharjo, B. Purwandari, “Agile project management challenges and mapping solutions: A systematic literature review.” International Conference on Software Engineering and Information Management, Association for Computing Machinery, pp. 123–129, 2020. DOI: 10.1145/3378936.3378949.
F. Marle, “An assistance to project risk management based on complex systems theory and agile project management. Complexity”, Article ID 3739129, 2020. DOI: 10.1155/2020/3739129.
V. P. Denney, “Exploring the upside of risk in project management: A phenomenological inquiry.” Journal of Modern Project Management, vol. 8, no. 23, pp. 278–299, 2020. DOI: 10.19255/JMPM02312.
P. Willumsen, J. Oehmen, V. Stingl, J. Geraldi, “Value creation through project risk management.” International Journal of Project Management, vol. 37, no. 5, pp. 731–749, 2019. DOI: 10.1016/j.ijproman.2019.01.007.
M. Papadaki, N. Bakas, E. Ochieng, I. Karamitsos, R. Kirkham, “big data from social media and scientific literature databases reveals relationships among risk management.” Project Management and Project Success, pp. 1–18, 2019. http://dx.doi.org/10.2139/ssrn.3459936.
P. Diddi, L. Wei, “Crisis management on social media: Effect of pre-crisis inoculation strategy and midst-crisis organizational interactivity.” Public Relations Review, vol. 48, no. 5, p. 102206, 2022. DOI: 10.1016/j.pubrev.2022.102206.
M. Kanagarajoo, R. Fulford, C. Standing, “The contribution of social media to project management.” International Journal of Productivity and Performance Management, vol. 69, no. 4, pp. 834–872, 2020. DOI: 10.1108/IJPPM-09-2018-0316.
S. Filippetto, R. Lima, J. Barbosa, “A risk prediction model for software project management based on similarity analysis of context histories.” Information and Software Technology, vol. 131, p. 106497, 2021. DOI: 10.1016/j.infsof.2020.106497.
Z. Hu, R. Odarchenko, S. Gnatyuk, M. Zaliskyi, A. Chaplits, S. Bondar, V. Borovik, “Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior.” International Journal of Computer Network and Information Security, vol. 12, no. 6, pp. 1–13, 2020. DOI: 10.5815/ijcnis.2020.06.01.
J. Ojeniyi, E. Edward, S. Abdulhamid, “Security risk analysis in online banking transactions: Using Diamond Bank as a case study.” International Journal of Education and Management Engineering, vol. 9, no. 2, pp. 1–14, 2019. DOI: 10.5815/ijeme.2019.02.01.
J. Crispim, L. Silva, N. Rego, “Project risk management practices: the organizational maturity influence.” International Journal of Managing Projects in Business, vol. 12, no. 1, pp. 187–210, 2019. DOI: 10.1108/IJMPB-10-2017-0122.
M. Abdulrahaman, J. Alhassan, J. Ojeniyi, S. Abdulhamid, “Security Risk Analysis and Management in mobile wallet transaction: A Case study of Pagatech Nigeria Limited.” International Journal of Computer Network and Information Security, vol. 10, no. 12, pp. 21–33, 2018. DOI: 10.5815/ijcnis.2018.12.03.
Z. Hu, Yu. Khokhlachova, V. Sydorenko, I. Opirskyy, “Method for optimization of information security systems behavior under conditions of influences.” International Journal of Intelligent Systems and Applications, vol. 9, no. 12, pp. 46–58, 2017. DOI: 10.5815/ijisa.2017.12.05.
N. Dotsenko, D. Chumachenko, I. Chumachenko, “Modeling of the process of critical competencies management in the multi-project environment.” IEEE International Conference on Computer Sciences and Information Technologies, Lviv, Ukraine, pp. 89–93, 2019. DOI: 10.1109/STC-CSIT.2019.8929765.
S. Fedushko, O. Mastykash, Y. Syerov, A. Shilinh, “Model of search and analysis of heterogeneous user data to improve the web projects functioning.” Lecture Notes on Data Engineering and Communications Technologies, vol. 83, pp. 56–74, 2021. DOI: 10.1007/978-3-030-80472-5_6.
J. Song, A. Martens, M. Vanhoucke, “Using schedule risk analysis with resource constraints for project control.” European Journal of Operational Research, vol. 288, no. 3, pp. 736–752, 2021. DOI: 10.1016/j.ejor.2020.06.015.
A. Arman, “A risk-aware application scheduling model in cloud computing scenarios.” International Journal of Intelligent Systems and Applications, vol. 8, no. 10, pp. 11–20, 2016. DOI: 10.5815/ijisa.2016.10.02.
C. Myers, H. Cowie, “Cyberbullying across the lifespan of education: issues and interventions from school to university.” International Journal of Environmental Research and Public Health, vol. 16, no. 7, p. 1217, 2019. DOI: 10.3390/ijerph16071217.
G. Giumetti, R. Kowalski, “Cyberbullying via social media and well-being.” Current Opinion in Psychology, p. 101314, 2022. DOI: 10.1016/j.copsyc.2022.101314.
L. Schenk, “Was ist Cybermobbing? Mobbing an Schulen: Maßnahmen zur Prävention.” Intervention und Nachsorge, pp. 273–301, 2020. DOI: 10.1007/978-3-658-26456-7_15.
H. Dreßing, U. Klein, J. Bailer, P. Gass, C. Gallas, “Cyberstalking.” Der Nervenarzt, vol. 80, pp. 833–836, 2009. DOI: 10.1007/s00115-009-2732-2.
A. Nai, F. Martínez i Coma, “The personality of populists: provocateurs, charismatic leaders, or drunken dinner guests?” West European Politics, vol. 42, no. 7, pp. 1337–1367, 2019. DOI: 10.1080/01402382.2019.1599570.
J. Barry, J. T. Gironda, “Operationalizing thought leadership for online B2B marketing.” Industrial Marketing Management, vol. 70, pp. 5–12, 2019. DOI: 10.1016/j.indmarman.2017.11.005.
X. Wang, D. Shi, J. Wang, Z. Yu, Z. Wang, “Online identification and data recovery for PMU data manipulation attack.” IEEE Transactions on Smart Grid, vol. 10, no. 6, pp. 5889–5898, 2019. DOI: 10.1109/TSG.2019.2892423.
S. B. Rodrigues, D. J. Hickson, “Success in decision making: different organizations, differing reasons for success.” Journal of Management Studies, vol. 32, no. 5, pp. 655–678, 1995. DOI: 10.1111/j.1467-6486.1995.tb00793.x.
E. Istomin, V. Abramov, O. Lepeshkin, E. Baikov, S. Bidenko, “Web-based tools for natural risk management while large environmental projects.” International Multidisciplinary Scientific GeoConference: SGEM, vol. 19, no. 5.3, pp. 953–959, 2019. DOI: 10.5593/sgem2019/5.3/S21.120.