Problem-Action-Consequence Techniques

Superior Essays
ASSIGNMENT 1
Problem-Action-Consequence Technique
Submitted by: Harjot singh
Class ID: 11612354

Submitted to: Mr Nectar Costadopoulos

(Words 1010)

This article is identified with a discussion on a task among Project Manager and Project director concerning about early launch of a project which brought about ethical dilemma. There's a considerable measure of contentions occurred among them whether to dispatch the task early or not which contains bunches of sensible data about the clients. (Al-Saggaf, n.d.)

What is actually happening?
In the discussion among team, Project manager is endeavoring to persuade project director to convey the task before time by getting underweight from CEO of the organization as he needs
…show more content…
They can convey it before time without thinking about the security encryption. As, they can get preferred standpoint of new open door by completing it before time. They can convey it before time with no encryption and without letting know anyone about it and can do security encryption following couple of weeks once they convey as new updates and issue will be solved and it can advantage to all including group. There will be realities that once they convey it before time with no security encryption, they will put the data of the considerable number of clients on chance as there will be more opportunities to get it be hacked. Another reality that they will convey it on time so in thusly the notoriety of the organization and the data of clients will stay in safe hands.
What are the ethical and non-ethical issues?
There will be such huge numbers of moral and non-moral issues. As the organization will be in big misfortune. The odds that organization will be fixed and be get under obligations. There will be no put stock in factor among organization and the clients. The notoriety of the group including organization, project supervisor and undertaking executive will be go down. There will be so numerous legitimate charges on the organization and organizations' directors to losing the individual data. (R.H. Gray, n.d.)
Who is
…show more content…
The most vital moral issue is the organization will lose the clients trust. The organization's notoriety will be lost. No one needs to work with that organization as the client's security encryption was there prime obligation to protect them from programmers. So What Could they do, they needed to endeavor to safe the individual data issue to vast degree. The organization could be in lawful inconvenience as they need to pay bunches of cash by doing it. So they need to stay with that undertaking and finish it on time by going safe side and need to profit by offering it in great cost.
What can be done about it?
They need to concur with the project manager by going under weight and to dispatch it before time by putting organization's notoriety and security encryption on hazard. The other thing they can do by adhering to their choice and convey it on time. The vital thing they can give additional opportunity to finish the task. It is not conceivable to complete the assignment before due date, they can finish it in fortnight by working extra minutes and reveling specialists and security specialists so they could get it going to finish it before time. Furthermore, additionally they can do by accomplishing more updates in

Related Documents

  • Improved Essays

    Ism 491a Capstone Project

    • 695 Words
    • 3 Pages

    This document provides the progress of my ISM 491a capstone project. This project was to research an encryption method that would strengthen the company’s environment and protect them if there was ever a data breach. As presented in my project proposal, I identified two principal objectives for this project to be successful. The first was to perform an assessment of the environment currently in place, and the second was to come up with an encryption solution that can be implemented in the company‘s environment without disrupting any applications or processes. This update will provide the research that is completed to this point, the area that I am falling behind in, and the strategy to bring the delinquent tasks up to date.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) = number of characters in the message User is asked to send message of this size. Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    identify and explain 3-4 ethics issue (e.g. harm to stakeholder group, relevance of ethics theories, etc.). One of the biggest issues would be approaching to one’s privacy. Privacy and confidentiality include financial, medical, political, governmental and legal issues. The first issue involves not letting the participants know that they have the right to refuse any questions they feel is private.…

    • 1398 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Ethical Dilemmas Essay I have chosen to analyze case two and this paper will outline my understanding, exploration, and final decision-making process as it applies to the ethical dilemmas presented. Understanding the Dilemmas This case has a variety of ethical dilemmas occurring across several contexts (personal, societal, and organizational). Reflecting on the theories and conceptual models presented in this course, I found the Five Faces of Oppression (Young, 2014) and the Ecological Systems Theory (Bronfenbrenner, 1979) helpful in conceptualizing these various circumstances and contexts.…

    • 1501 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Case Study 8 The Ccmma

    • 783 Words
    • 3 Pages

    CASE STUDY-8 THE CCPM DILEMMA Executive Summary: Pinyarat worked in IT department of diversified firm. Firm increment budget by 10 percent to all activity because all project were coming to late while people was working too hard and wants to relief. Result this approach failed, after this firm decide to give extra time and 10 percent for complete project on given time schedule but overall result failed. Nothing improved and project continued late from actual date.…

    • 783 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The study also explains the fact that for most healthcare organizations the confidence level in its employees to actually notice a data breach is next to none. If they can’t detect the breach then they are not capable of notifying anyone in the event of one. A data breach can go undetected for quite some time before anyone is even aware of it. Another problem is there are so much time and money spent on policies and procedures and not enough money spent on enforcing them. It is important that healthcare personnel understand all of the laws regarding patient confidentiality.…

    • 1294 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    1)PROBLEMS(List the identified problems) Lack of guidance • Conflict in the Company is evident due to a lack of guidance from senior management. We see conflict between managers which will eventually lead to poor efficiency in the Company. Bad Management Practices • Multi Projects is a consulting company in project management. The company operates on a Matrix type organisation, but there seems to be bad management practises between the different project managers.…

    • 1642 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    DESIGN A decision has been reached by individual(s) with responsibility to effect change in order for an organisation to remain competitive and flourish. Plan. In order to start the process a proposal (business case) needs to be produced. This would identify the issues that need to be addressed, cost implications, who should be directly involved with the project and the potential outcome and benefits.…

    • 737 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nayatel Case Study

    • 1443 Words
    • 6 Pages

    PMO DEPARTMENT IN NAYATEL COMPANY: After the analysis of PMO,the management has decided to establish the PMO department in Nayatel. The PMO plays a supportive role in the organization by providing training's to the project team members on various projects, tracking the progress of the project and communicating the success of the project to the board of directors and key stakeholder 1.ISSUES FACED BEFORE PMO: After the foundation of a Project Management Office, numerous issues and issues identified with projects have been resolve under the help of the PMO-Nayatel. The PMO has controlled the project consummation stages, making it a more light-footed, fruitful and viable process.…

    • 1443 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    If the organization and all of the employees believe in a code of ethics, then most likely the decision will be ethical. Opportunity factors are based on whether there are opportunities to make ethical or unethical decisions. If the company promotes the do whatever it takes motto, then…

    • 566 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2. What information did the vice president fail to analyze? The vice president (VP) fails to analyze the overrun properly. The predictable overrun should be (81+55+73+70)/ (74+52+68+60)*2.66-2.66=$272,283, which is 10.24% of the overall budget, as well as the schedule.…

    • 1080 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The reasons we see these results is because the cryptographic software changes the security of that said organization. Data that was once open to everyone is now only accessible to those who have access or encryption keys. Some organizations have also experienced user complains. If encryption keys are lost the data that is encrypted could be rendered useless. The companies that implement cryptographic software also see an increase in costs.…

    • 874 Words
    • 4 Pages
    Improved Essays