Print Сite this

IT Project Management Proposal BPM in KSA

The title of my research proposal is Increasing security in e-government through BPM in KSA.

We will write a
custom essay
specifically for you

for only $16.05 $11/page
308 certified writers online
Learn More

Background

BPM is a strategy used in organizations and business operations to improve business processes. For example, it can be used to identify missing items that should not be missing or assist an employee in tracing problems that could have led to failure of delivery of particular items. It is a unique technology that brings together IT and participants in the business world to come up with systems aimed at integrating business users, processes and information (Traunmuller 95). I have been carrying out various studies related to the field of e-government and my strong background in this field will enable me carry out extensive research (Wyron 5).

Objectives of the Research

My program of study highly recognizes the importance of carrying out intensive research in the field of business with a special interest in e-government. In the business industry, different ways have always been devised in order to improve business processes. The main objective of this research is come up with a detailed analysis of the security issues that are affecting e-government in KSA. The research will also aim at finding out how BPM increases security in e-government in KSA. Currently, not many operations in e-government are making use of BPM owing to the reason that information on how BPM can increase security in e-government in KSA is still sketchy. This research will be very important as it will come up with concrete information on how security in e-government in KSA can be improved through BPM.

Research Questions

The following are some of the questions this research will seek to answer:

  • What is the importance of BPM in modern business?
  • What are the security issues that are facing e-government?
  • How can the security challenges affecting services in e-government in KSA be addressed
  • How can BPM increase security in e-government in KSA

Methodology and Planning

There are different methodologies for conducting researche in various fields. For this research to be successful, a suitable method of conducting the study is critical. The research is expected to employ a workable approach in investigating the questions it aims to answer. In my research, I will rely on written literature relevant to my field with occasional use of questionnaires to collect first hand information. The questions primarily focus on the security issues prevalent in e-government and how BPM can be used to increase security in e-government in KSA. Before the actual research, I will first plan for the research to ensure that I complete the tasks within the stipulated time frame. I expect that within a period of three months I should be through with the research.

Results of the Research

After a successful completion of the research, I expect to find out how BPM can be used to increase security in e-government in KSA. The research is also expected to identify the security issues facing e-government in KSA.

Conclusion

This research will be important since it will counter theories that have argued that BPM cannot increase security in e-government in KSA. The research will bring a difference because it will prove that BPM can actually be employed in increasing security in e-government in KSA.

Get your
100% original paper
on any topic

done in as little as
3 hours
Learn More

References

Traunmuller, Roland. Electronic government. New York: Springer, 2004. Print

Wyron, Amy. Streamlining e-Government Through a BPM System. 2011. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, August 9). IT Project Management Proposal BPM in KSA. Retrieved from https://studycorgi.com/it-project-management-proposal-bpm-in-ksa/

Reference

StudyCorgi. (2022, August 9). IT Project Management Proposal BPM in KSA. https://studycorgi.com/it-project-management-proposal-bpm-in-ksa/

Work Cited

"IT Project Management Proposal BPM in KSA." StudyCorgi, 9 Aug. 2022, studycorgi.com/it-project-management-proposal-bpm-in-ksa/.

* Hyperlink the URL after pasting it to your document

1. StudyCorgi. "IT Project Management Proposal BPM in KSA." August 9, 2022. https://studycorgi.com/it-project-management-proposal-bpm-in-ksa/.


Bibliography


StudyCorgi. "IT Project Management Proposal BPM in KSA." August 9, 2022. https://studycorgi.com/it-project-management-proposal-bpm-in-ksa/.

References

StudyCorgi. 2022. "IT Project Management Proposal BPM in KSA." August 9, 2022. https://studycorgi.com/it-project-management-proposal-bpm-in-ksa/.

References

StudyCorgi. (2022) 'IT Project Management Proposal BPM in KSA'. 9 August.

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyCorgi, request the removal.