Sunday, January 26, 2020

Bring Your Own Device System: Pros and Cons

Bring Your Own Device System: Pros and Cons Table of Contents (Jump to) Introduction Advantage of using BYOD Risks of using a BYOD System How to build a Secure BYOD policy 1. Carry out a survey 2. How does employees use their device on the cooperate network Suggested BYOD Policy Access Control/ Acceptable Use Roles and responsibilities Devices and Support Security Termination of employment ISO standards to follow Benefits of using ISO 27002 Reference list Bibliography Introduction Calathumpian Group is facing a major information integrity issue, the CEO is concern about the way cooperate information are treated. The company is allows BYOD (Bring Your Own Device) system which means that employees can use their personal laptops , smartphones or tablets on the workplace for their daily workload and to connect to the corporate network (Webopedia.com 2015). Advantage of using BYOD Maximise profit by reducing personnel hardware cost The purpose of all organisation is to maximise profit while minimising expenses, BYOD allows minimum-zero technology cost since there is no purchase cost for employees working device and maintenance cost for the devices. Improve employees performance BYOD improves employee’s performance and efficiency at work as by allowing them to use their personal devices with which they use also for recreational or home purpose, they developed automatism that increase their productivity. Tasks and operations are completed faster (Workforce 2014). Reduce hardware alienation BYOD helps to keep employees comfortable in their working environment, since they know how to operate with their work devices. For example: for a new employee, it’s better to work with a device he/she knows than cooperate devices as they will have to be trained. Risks of using a BYOD System Software incompatibility Employees working on different versions of OS or software tools can cause information being not accessible or shared. This is not efficient and restrict data access. Distractions Employees usually have their favourite apps, games or series present on their laptops or smartphones, these entertainment may distract employees during their working hours thus reducing their performance. For example: employees checking their Facebook account every 20 minutes. Security Security is the major problem with BYOD systems, as it puts all your cooperate data in risk. As all employees will certainly use their devices outside the workplace, if they are infected by a virus or targeted by a hacker and connect to the cooperate network, the whole network will be affected and important data may be corrupted, stolen or deleted. How to build a Secure BYOD policy 1. Carry out a survey I order to build an effective BYOD policy, we have to analysis what type of devices are being used on the cooperate network. A survey done by the Forrester’s Forrsights Workforce Employee shows that smartphones and tablets are among the most used device on the workplace, the laptop being the most used device, as illustrated on the image 1, (InfoSec Institute 2013). 2. How does employees use their device on the cooperate network We have to analyse what processes are done by employees on the network, this will enables the BYOD policy to match the business operations. For example: Are they using skype to connect foreign suppliers, what software applications are being used, what mobile application is using the WIFI system to operate. This analysis will help to developed acceptance criteria and limitations for the BYOD policy. Suggested BYOD Policy In order to solve the situation Calathumpian Group is facing we will developed a BYOD Policy that can be implemented in the organisation’s system. The report will contain policy about acceptance use, User responsibilities, Cooperate IT Responsibilities, Devices and Support, Privacy Policy and Security Policy, we will keep the report simple and easy to understand in order to make the implementation of the Policy system better. Calathumpian’s employees must agree to the following policies in order to connect their devices to the cooperate network. If they fail to abide to the policies the company reserves the right to disconnect them to the network and press further charges. These policies are implemented for the well-running of the organisation by enforcing security and protect cooperate data. The template of Megan Berry (2015) will be used to develop the BYOD policy, it is simple and very comprehensive template (Itmanagerdaily.com 2015). Access Control/ Acceptable Use Activities that are productive to the business are considered as acceptable. Certain websites will be blocked on the network for the employees during working hours, only before and after the working hours that these websites will be accessible. This will encourage employees to be on time. Such websites relates to Social Networks (Facebook, Twitter, Instagram, Google +, etc†¦) Video Games related website Betting website Pornographic Torrents Streaming websites The network will only allow a limited amount of software tool to use internet or allowed connection to the network, this will decrease the risks of propagating viruses on other connected devices. Mobile apps that are allowed on the network are : emails , messaging apps (such as WhatsApp , Viber , Messaging , Skype) , system updates Mobile apps that are blocked includes : iTunes , Google Play , Apps Store , Mobile Games and Social networking apps Roles and responsibilities Dividing responsibilities in the company helps to maintain a certain hierarchy and determine how should do what and when. In order to solve the problem Calathumpian Group is facing, roles and responsibilities must be implemented so that the employees knows what are expected from them. In this case a structured IT department is needed. IT Security Manager Since the CEO of the Group might not be comfortable with IT department due to his age, it is better to choose some who is qualified for this job. The IT Security manager will be in charge for the creation and maintenance of the BYOD policy. This involves the risk management, security management and enforcing the BYOD policy. Human resource manager The HR manager will be responsible for the comprehension of the BYOD policy inside the company. His job is to ensure that the employees understand their commitment. IT department This department will provide help for the employees regarding the BYOD policy. For example: when an employee terminate his contract with the company, the IT department is responsible for the deletion of sensible information regarding the company. They are also responsible for the implementation of hardware policies such as: block websites and some mobile application, antivirus configuration (Auto scan on power on), maintenance of the network and other processes. All employees All employees must abide to the set of rules and regulations present in the BYOD policy, not respecting it will cause sanctions from the organisation as they are putting the company’s information at risks. Devices and Support Mobile operating system such as IPhone (4, 4S, 5, 6), Android devices (KitKat and Lollipop), Blackberry and Windows phone are allowed only. Android tablets and IPad are allowed The IT department is not responsible for any device software or hardware failure The IT department has the right to take the mac address of every device connected to the network, for security purpose. The mac address will help the IT department to apply certain restriction to specific employees Security To prevent unauthorised access to devices, employees must use strong passwords to protect their devices. A strong passwords is categories as Having at least 8 characters Combination of lower and upper case letter Must include at least two digits Cannot contain symbols Employees must change their passwords every 60 weeks Every time an employee leave his work place, he/she must automatically lock his/her device to prevent unauthorised access. Employees must encrypt their information such as emails , documents and other files Employee must hand over their devices to the IT department in order to connect to the network Termination of employment In order to prevent cooperate information to be accessible when an employee leaves the organisation for a particular reason, the later must present the device used on the network for inspection. The IT department will be responsible for that (Shrm.org 2015), they will delete all company related data on the device. ISO standards to follow â€Å"A standard is a document that provides requirements, specifications, guidelines or characteristics that can be used consistently to ensure that materials, products, processes and services are fit for their purpose. We published over 19500 International Standards that can be purchased from the ISO store or from our members Tools and techniques â€Å"(Iso.org 2015) In this case the ISO standard that best suit the problem of Calathumpian Group is the ISO/IEC 27002, which focus on information security management. This standards helps to maintain information such as employee details, cooperate financial report or other cooperate related information. Benefits of using ISO 27002 Risk management Find potential risk Helps to eliminate them Security policies Information security management Resource management HR security Physical security Communications management Access control Incident response management (SearchSecurity.co.UK 2015) Tools and Techniques Incident Response Reference list InfoSec Institute,. 2013. Importance Of A BYOD Policy For Companies Infosec Institute. http://resources.infosecinstitute.com/byod-policy-for-companies/. Itmanagerdaily.com,. 2015. BYOD Policy Template. http://www.itmanagerdaily.com/byod-policy-template/. SearchSecurity.co.UK,. 2015. What Is ISO 27001? Definition From Whatis.Com. http://searchsecurity.techtarget.co.uk/definition/ISO-27001. Shrm.org,. 2015. Electronic Devices: Bring Your Own Device (BYOD) Policy. http://www.shrm.org/templatestools/samples/policies/pages/bringyourowndevicepolicy.aspx. Webopedia.com,. 2015. What Is Bring Your Own Device (BYOD)? Webopedia. http://www.webopedia.com/TERM/B/BYOD.html. Workforce, The. 2014. The Pros And Cons Of Bring-Your-Own-Device (BYOD) For A Mobile Field Workforce MSI Data. MSI Data. http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce. Bibliography 1 | Page Sensoneural Hearing Loss: Features of Patients Sensoneural Hearing Loss: Features of Patients Permanent unilateral and bilateral assymetrical sensorineural hearing loss: Clinical, vestibular, audiological and radiological evaluation. Abstract The aim of this study was to evaluate the clinical, vestibular, audiological and radiological features of patients with permanent unilateral and assymetrical sensoneural hearing loss (SNHL). Material and methods: Twenty eight patients with either permanent unilateral and asymmetrical bilateral SNHL,diagonosed by means of pure tone audiometry(PTA) have been submitted to clinical,vestibular, audiological and radiological evaluation. Results: Total twenty eight patients with male :female ratio of 2.11 were analysed. 22 (78.57%)patients had unilateral and 6(21.43%)patients had bilateral asymmetrical SNHL.Right :left ratio in cases of unilateral SNHLwas 0.83:1. Both tinnitus and vertigo was present in 12(42.95%)patients and absent in 10 (35.8%)patients.On otoscopy tympanic membrane was intact in all cases.PTA showed profound loss in majority of cases.Tone decay was done in11 patients and was normal in all cases.Cold calorie was done in 27 patients and was absent in 7(25.9%)patients ,hypoactive in 8(29.6%)patients.MRI study was done in 9 patients.Out of 9,7 were normal and rest two showed positive findings. Conclusion: Proper clinical, vestibular and audiological work up is important before radiological investigation is sought to increase diagonostic yield and cost effectiveness in unilateral, bilateral (asymmetrical)SNHL. INTRODUCTION Although a commonly encountered diagnosis by otolaryngolist, unilateral SNHL represents a difficult clinical entity for the specialist. Whereas the diagnosis is easily obtained by PTA, diagonosis of cause and treatment represents the complexity of this clinical situation. Further complicating work up is the evergrowing cost for laboratory and radiological studies(1).Reiss M (1994) carried out study for differential diagnosis of unilateral hearing loss(2).Hendrix RA(1990) carried out study on asymmetrical sensoneural hearing loss.(3).Asymetrical hearing loss is the difference of more than 10 db averaged over the frequencies 0.5,1,2 and 4Khz or 20 db or more at any single frequency(4).A recent study has suggested a rule 3000 where in asymmetry of 15 db or more at 3000Hz require a MRI. If less than 15 db, a biannual audiometric follow –up is sufficient(13).In present study, we present clinical, vestibular ,audiological and radiological features of patients with either permanent u nilateral SNHL or asymmetrical hearing loss. MATERIAL AND METHODS This prospective study was conducted in the department of Otorhinolaryngology,government medical college,Srinagar,Kashmir on 28 patients, consisting both pediatric and adult patients from December 2013 to May 2014. After taking history about hearing loss and associated symptoms, otoscopy and PTA, patients were subjected to audiological and vestibular evaluation. Radiological investigation(MRI) was done in selected group of patients because of financial and other reasons. Sex distribution, laterality, audiological, vestibular and radiological findings are presented in tables1-6. RESULTS A total of 28 patients were included in present study. Out of 28 patients,19 were males and 9 were females with male to female ratio of 2.11.(table 1).Involvement of left ear was more common than right and 6 patients (21.42%) had bilateral asymmetrical loss(table2).Vertigo and tinnitus was associated symptoms in 12 patients(42.95) and 10patients(35.8%) presented with hearing without associated symptoms(table3).Tone decay test was normal in all tested patients.(table4).Cold calorie test was hypo- active in 8 patients(29.6%) and absent in 7 patients(25.9%)(table5).Radiological findings were normal in 7 out of 9 patients(table6). DISSCUSSION We describe 28 patients of unilateral and asymmetrical SNHL which were clinically ,audiologically and radiologically evaluated. Male preponderance was observed in the present study which is consistent to other study.(5). In studies by Cadoni G etal(2005) and Stefano Berrettini(2013), both have female preponderance which is in contrast to present study(6,7). In present study,left ear was more affected as compared to right which is in consistant to study done by Stefano Berrettini(2013).(7). In our study tinnitus is present in 14 patients(50.09%) and vertigo is present in 16 patients(59.3%). Study done by Stefano Berrettini showed tinnitus was present in 87% and vertigo in 44% cases(7). In present study, Tone decay test(TDT) was done in 11 patients.TDT was not done inpatients having profound SNHL. In all patients in which TDT was done ,results were normal. P.L.Bhatia (1969) etal in his study used TDT for diagonosis of retro cochlear pathology(8). It helps in diagonosing neural lesions quite accurately(9). In our study vestibular function test (cold calorie test) was done in all patients except one.CCT was absent(no response) in 7 patients(25.9%) and hypoactive in 8 patients(29.6%).Stafano Berrettini etal used calorie stimulation test in his study(7). Although the findings of decreased vestibular function on calorie testing in ipsilateral side to a SNHL historically has been usefull in suggesting the diagonosis of vestibular schwannoma. But at present ,it is not sensitive enough tobe helpful diagonostically for vestibular schwannoma because a small inferior vestibular nerve schwannoma might not cause an abnormal calorie response(10).Hypoactivity of the affected side is seen in meineres disease(11). In present study,patients having hypoactive calorie test or absent calorie test or in whom tone decay test could not be done due to profound hearing loss were subjected to radiological investigation(MRI).One patient on MRI showed micro haemorrhages in left peritrigonal area and other patient on MRI showed vestibular schwannoma.MRI is now the recommended investigation for diagonosis of retrocochlear pathology.(2,12).MRI scanning with Gagolinium will identify virtually all tumours and was considered to be gold standard(14).Recently T2-weighted fast spin echo MRI has been found to be sensitive and less expensive than gadolinium enhanced standard MRI(15). CONCLUSION Clinical ,audiological and vestibular testing is important in diagonostic workup of unilateral and asymmetric hearing before radiological investigation is done to decrease economic burden and to increase diagonostic yield from definite radiological investigations. REFERENCES 1.Jacques Peltier.Grand rounds presentation,UTMB,Dept. of Otolaryngology Nov10,2004. 2.Reiss M,Reiss G. Differential diagonosis of unilateral hearing loss.Praxis .2000.Feb 3;89(6):241-247. 3.Hendrix R A,De Dio RM,Scalajani AP.The use of diagonostic testing in asymmetrical SNHL. Otolaryngol Head Neck Surgery.1990 oct;103(4):593-8. 4. David M Baguley.Age –related SNHL.Chapter238 a.Scott Browns vol 3 seventh Edition. 5.Prognostic factors of sudden SNHL in diabetic patients.Diabetes care October 2004 vol.27 no10 2560-1. 6.Cadoni G etal.Sudden SNHL:Our experience in diagonosis, treatment and outcome.J.Otolaryngol.2005 Dec;34(6):395-401. 7.Stefano B.etal.Analysis of 3-D(FLAIR) sequence in Idiopathic SSNHL.JAMA Otolaryngol head and neck surgery vol 139(no.5)May 2013. 8.P.L.Bhatia.A Sinha. Tone decay test: A simple and reliable audiological test.Laryngoscope vol79 issue 11 page no 1879-90.Nov 1969. 9.Anirban Biswass.Tone decay test. Clinical and vestibulometry.Fourth Edition. 10. Glasscock-Shambauugh.Surgery of the ear.Chapter 32.Fifth Edition. 11.Abir K Bhattacharya, Jabin thaj. Investigation protocol for SNHL. Otorhinolaryngology Clinics: An international Journal,may-aug 2010;2(2):107-112 12.Mahillon V. Diagonostic management of unilateral SNHL in adults.Rev med Brux 2003 Feb;24(1) :15-19 13.Saliba I, Martineau G,Chagnon M.Asymmetric hearing loss: Rule 3000 for screening vestibular schwannoma. Otol Neurotol 2009 jun; 30(4) :515-521 14.Fergusion etal. Efficiency of tests used to screen cp angle tumours: A prospective study.Br J Audiol 1996,jun :30(30):159-76 15. Shelton C. etal. Fast spin echo MRI: Clinical application in screening for acoustic neuroma. Otolaryngol Head neck surgery 1996:114(1):71-76 Table1: Sex distribution of patients (n=28) Table 2: Laterality of involved ear of patients (n=28) Table 3: Associated symptoms with hearing loss (n=28) Table 4: Tone decay test of patients (n=11) Table 5: Cold Calorie test of patients (n=27) Table 6: Radiological (MRI) findings of patients (n=9)

Saturday, January 18, 2020

Lord Of The Flies Chapter 5 Essay

The boys life has deteriorated a lot since they first arrived on the island and from the look of the situation things can only get worse unless they change their behaviour and attitude . There is a lot of conflict between Ralph and Jack, the fear of the unknown is growing, the boys are turning into savages and becoming more uncivilised by the day, rules and taboos are being disobeyed and ignored, and bullying and rivalry is becoming more of a problem. The conflict between Ralph and Jack is causing a lot of tension in the group and is therefore affecting the boys lives. It has already divided them into separate groups with different priorities as some have followed Jack and some have followed Ralph. Jack and Ralph’s different priorities is the main reason for the conflict between them as they are completely opposite. Jack wants control and started of wanting to be leader but was out done by Ralph who was voted the leader. Jack is short tempered and very big headed where as Ralph is realistic, kind hearted and organised. Ralph’s main priority is to be rescued and have fun have fun on the island. Their relationship is described in the book as ‘two continents of experience’ and ‘ baffled in love and hate’. Their personality also clash as they are completely different. Ralph is optimistic, respectful, fair, practical and naà ¯Ã‚ ¿Ã‚ ½ve, where as Jack is arrogant, boastful, power hungry, self centred, easily angered and brutal. The boys fear of the unknown is represented in different ways but is rapidly growing and could get out of hand. It started of as being a beastie, then a snake like creature, and now a beast from water or even a ghost. At first it was only the ‘litluns’ that were scared of the beastie and believed it existed but now the older boys are starting to get worried and have their doubts so none of the quite knows what to believe. Even Ralph has his doubts about what the thing is and he is supposed to be leader, ‘ I don’t believe in ghosts at least I don’t think so’. This comment from Ralph shows that he is now considering there being some type of creature on the island even though he just dismissed the idea at the beginning. Deterioration has also been caused by the boys becoming totally uncivilised and turning into savages. Although they are now looking like savages as their hair has grown, Jack is mainly responsible for them turning into savages. He was so obsessed with hunting to kill that he influenced the other boys that became his hunters. At the beginning they hunted but did not manage to kill for a ling time. Then when Jack finally did he became even more obsessed and made masks that he could hide behind while hunting, ‘ the mask was a thing on its own, behind which Jack lived’. This made Jack a different person when he put on the mask, he was a killer with no taboos or responsibilities. Jack’s passion for hunting also caused a major disagreement between him and Ralph because on the day a ship went by the fire was let out by boys that Jack made go hunting with him that day. Ralph said to Jack when he got back ‘ There was as ship, you let the fire out.’ There was a strong chance that they may have been rescued then but down to Jack they ended up eating their first pig. From successfully killing his first pig Jack felt very strong and had fulfilled his ambition so did not really care about the fire or Ralph. Rules have been completely ignored lately and systems of organisation disrespected. This has led to the boys becoming lazy and uncivilised. At one point things were going well and most things were well organised. There was toilet system worked out so there was not mess all over the island and water was being stored in coconut shells in the shade so hat it would be cool and fresh. Though now these systems have been ignored and the boys are going to the toilet anywhere on the island and no water is being stored. Ralph also tried to built shelters for them to sleep in which would have been practical but Simon was the only one that would help in the end so they could not be completed. This shows how disorganised the boys have become and disrespectful. They have no taboos and without adults they have forgotten the way they had to behave. Bullying has also become a problem that has led to a deterioration in the boys life. Jack consistently picks on Piggy and uses him as scapegoat for his own mistakes. He makes little of Piggy and by doing this he is trying to show that he has power over the boys as well as Ralph. The litluns are also being ignored and sometimes bullied by the elder boys. Although this might have happened a bit before they arrived on the island but there were still taboos that the older boys had. All these reasons have led to deterioration in the boys life. Their behaviour on the island has had consequences and meant that their lives have become less structured and disciplined and more savage like. Ralph described the situation by saying, ‘we are all drifting and things are turning rotten’. This shows us that the boys are drifting apart and could possibly separate into different groups completely which would also make their life deteriorate more.

Friday, January 10, 2020

B.F. Skinners theory of punishment Essay

When you think of punishment and reward you think of a reaction; but man has come up with theories of why we do the things that we can do. Conditioning and learning is defined as change in behavior, which is resulted by different types of practices and experiences. In this report the main topics will be classical conditioning, operant conditioning, cognitive-social learning, and neuroscience and evolution. Every time we do something good or bad the outcome determines our reactions in future situations. This learning process that is associated between environment stimuli and behavioral responses. Breaking down the rewards system you come along reinforces and reinforcement. Both are good ways to get a conditioned response. First we primary rein forcers, this increases the chance because it satisfies a need for sex, food, and water. Secondary rein forcers increase the probability of a reaction because of value, money, and possessions through learning. Positive reinforcement is a reward that adds stimulus to increase chances of responses. Positive reinforcement would be a paycheck for a job well done. Negative reinforcement is the exact opposite removing or taking away stimulus of the action not occurring again. The two types of conditioning we are covering is classical and operant. Conditioning is learning through repetition of exercises of rewards or punishment to get a response. The pioneer scientist in classical conditioning is Ivan Pavlov. Classical conditioning is also known as a Respondent or Pavlovian conditioning. Classical is also involuntary which is one of the major differences from operant conditioning. Classical conditioning happens when an unrelated response through association with a stimulus that already makes a similar or related response. An example of classical conditioning is for some people when you hear the sound of running water you need to use the bathroom. The other types of conditioning are Operant, also called Instrumental and Skinnerian conditioning. In operant conditioning the punishment, reward, or in other words outcome is important. That adds to the probability that the act will be repeated or not. Operant conditioning is where consequences of a  particular behavior are described on the repetition of that same behavior. B.F. Skinner’s experiment of operant conditioning was a cat in a puzzle box. The only way the cat could get out was to pull on a rope; at first the cat did it by mistake. As the experiment went on the cat’s behavior became more and more purposeful. Soon the cat learned that the door opened immediately for his food. Skinner’s theory of reward was called positive reinforcement, and his theory of punishment was known as negative reinforcement. Reinforcement always increases the strength of the preceding behavior. Skinner was credited with the law of affect meaning an action will be repeated if it is rewarded. Another type of operant conditioning is called, Extinction. Extinction is a particular behavior that is weakened by the consequence of not experiencing a positive condition or stopping a negative condition. So far this report has broken down stimulus and observable reward and punishment behavior. Overall, some scientists believe the behavior cannot be explained by these theories alone. So next we come to cognitive social theory. Unlike Skinner’s black box theory, German psychologist Wolfgang Kohler wanted to look deeper inside the box. Kohler believed that solving a complex problem was responding to the stimuli in a trial and error statement. One of his experiments was with using a chimpanzee to try and find his way out of a cage and luring to reach a banana from the ceiling by using it’s insight to grasp the banana. Kohler tried the experiment again with another chimp placing him in the cage with two sticks this time and placing the banana farther then it’s grasp. The chimp lost interest in the banana when it was farther but then realized he could use the two sticks to extend his reach, allowing it (the chimp) to obtain the banana. Kohler called this a, learning insight. To wrap up this report we learned that the different types of conditioning are based on reward and punishment and they all have their own different theories and they are still being tested and experimented today.

Thursday, January 2, 2020

Cdr Sample Mechanical Engineer - 2568 Words

CAREER EPISODE 1 Designing of the Side Arm Charger During the time I have worked at XXXXX since February 2001 for approximately 5 continuous years as a full time mechanical engineering expert I have been assigned several engineering design projects. One of the projects I have been assigned at October 2005 to work on was to design the side arm charger of a wagon un-loader system. XXXXX was selected as the designer and execution supervisor of this project. The wagon un-loader system will be installed in KHORASAN Steel Complex (; KSC) at Neyshabour. The main purpose in KHORASAN Steel Complex is to construct a reduction plant in order to increase the amount of produced sponge iron to be used in the steel industries. This†¦show more content†¦I submitted and discussed the design project plan to the mechanical coordinator and took his approval on the plan. I had planned to complete all the activities including design, verification, and inquiry document preparation and engineering drawing and quality control plan documentation within 3 months. 1-6) After I took the approval of the mechanical design project plan, I conducted to provide an overall cost estimation of the design and execution of such a project considering a parametric cost estimating method based on a conceptual and preliminary draft design and reported the documented results to the mechanical coordinator. Regarding the results achieved we predicted an approximate saving of 250,000 euros only due to mechanical engineering design and execution. 2) Preliminary Studies 2-1) To get aware about the client’s technical requirements, since the wagon un-loader system was designing for the first time in Iran, first of all it was required to know about the function and duty of the wagon un-loader system. I requested a technical meeting with the process engineering team under the supervision of process engineering coordinator to get introduced to such an un-loader system. The processShow MoreRelatedProject Mgmt296381 Words   |  1186 Pagesof development. The significance of project management can also be seen in the classroom. Twenty years ago major universities offered one or two classes in project management, primarily for engineers. Today, most universities offer multiple sections of project management classes, with the core group of engineers being supplemented by business students majoring in marketing, management information systems (MIS), and finance, as well as students from other disciplines such as oceanography, health sciences