Premium Essay

I Think Someone Stole

In: Business and Management

Submitted By rida8882
Words 1479
Pages 6
All budgets for the project have been depleted and yet there are several steps needed to complete the project that require funding. If the budget has been depleted and the project still requires funding, the project leader has to propose a plan to prioritize the tasks that has to be completed without affecting the project. The project leader should be able to figure out which of the customer priorities can be compromised and by how much. The WBS element has to be reviewed and reworked on with the new funding. Associated risks also have to be reviewed in case some of the tasks are eliminated. If the customer is willing to delay the project, because of budget constraints, then the project leader can cut some resources to manage cost and finish the project at a later date. The project leader should encourage the team to use cost effective measures for all the remaining steps of the project. It is important that the project leader motivates the team by appreciating their work completed so far and help them understand that the work they are doing is important and is likely to be successful if they give their best in the last steps of the project and that they will be rewarded fairly for their efforts. New information comes to light that radically affects the project’s scope; for instance, management has recently purchased equipment that functions more effectively than the project team’s solution. When controlling scope changes, project leaders need to be effective negotiators. The project scope and deliverables if well written can be used to negotiate. Wise project leaders understand on one hand the customer’s sense of urgency in performing the project and on the other hand the change management problems that occur with changing the scope at the closing stage. Project leaders need to prioritize the opportunities presented with the scope change and discuss...

Similar Documents

Premium Essay

Boss I Think Someone Stole Our Customer Data

...Boss, I Think Someone Stole Our Customer Data- Assignment # 5 Name Withheld Strayer University Professor Name Withheld Project Risk Management (BUS 519) December 11th 2011 1. Of the four (4) commentaries that follow the case, select the one (1) that you believe to be the best solution to reporting the plan to address the problem and state why. Of the four commentaries, the one that I believe to be the best solution to address the issues faced by Flayton Electronics is that of James E. Lee. I particularly liked his recommendations because it addressed all the key areas that are necessary in a risk response plan. Lee’s recommendations are typical of contingency planning; according to Heldman (2005), contingency planning is a form of acceptance because if the risk occurs, you are willing to accept the consequences and devise a plan to deal with those consequences. He is in favor of acting with urgency by addressing the affected parties, as the longer it takes for the company to do this will make then appear less credible, Lee also recommended that once the risk is discovered, timing is an important element in implementing a risk response plan to minimize damages. This should be in the form of a prompt public disclosure once adequate information has been gathered; brand restoration should be initiated through public statements to help improve the company’s image; toll-free hotlines should be set up to address customers concerns; loyalty incentives in......

Words: 1683 - Pages: 7

Premium Essay

Boss, I Think Someone Stole Our Customer Data

...Case Study 3: Boss, I Think Someone Stole Our Customer Data Evaluate the obligation Flayton Electronics has to its customers to protect their private data. Develop the communication strategy you would take to notify the customers of the potential security breach. Recommend procedures that Flayton Electronics should take to prevent future security breaches http://hbr.org/product/boss-i-think-someone-stole-our-customer-data-harva/an/R0709A-PDF-ENG Flayton Electronics is showing up as a common point of purchase for a large number of fraudulent credit card transactions. It's not clear how responsible the company and its less than airtight systems are for the apparent data breach. Law enforcement wants Flayton to stay mute for now, but customers have come to respect this firm for its straight talk and square deals. A hard-earned reputation is at stake, and the path to preserving it is difficult to see. Four experts comment on this fictional case study in R0709A and R0709Z. James E. Lee, of ChoicePoint, offers lessons from his firm's experience with a large-scale fraud scheme. He advises early and frank external and internal communications, elimination of security weaknesses, and development of a brand-restoration strategy. Bill Boni, of Motorola, stresses prevention: comprehensive risk management for data, full compliance with payment card industry standards, and putting digital experts on staff. For the inadequately prepared Flayton, he suggests consulting an......

Words: 4240 - Pages: 17

Premium Essay

Boss, I Think Someone Stole Our Customer Data

...Abstract There is an imperative needing for enhance the security of credit card transactions over the internet as more and more people make their purchase online. The sensitive credit card details must be stored and processed securely by merchants. On this case, we will have the opportunity to learn about information security, implications and reactions when there is a security breach and how, what and where the companies need to inform their customers about the security breach and how they are improving their systems to keep from happening. Flayton Electronics comes up with a strategy on how to help customers with their identity theft while waiting for the secret service to determine what exactly happened. We will also be able to see how Flayton Electronics suffered damages and what kind of policies and procedures they need to implement to avoid another security breach impact. Paper: The main goal of information security is to protect the data or information from unauthorized access, use, disclosure, modification, inspection, recording and destruction in order to provide confidentiality, integrity and availability. Security is the most fundamental and critical of all the technologies disciplines an organization must have exactly in place to execute its business strategy. Confidentiality guarantees that the information can be read and interpreted only by processes and/or persons clearly authorized to do so. This means that computers system should prevent users......

Words: 1521 - Pages: 7

Premium Essay

Case Study 3, Boss, I Think Someone Stole Our Customer Data

...RUNNING HEAD: BOSS, I THINK SOMEONE STOLE OUR CUSTOMER DATA Boss, I Think Someone Stole Our Customer Data Teresa Ellis ACC.571 Forensic Accounting Strayer University Nauri D. Ahmed November 12, 2012 Boss, I Think Someone Stole Our Customer Data When there are potential data breaches, everything gets chaotic. Management and other key team members are scurrying around to find out what happened and why. They questi8on each other as to what caused the data breach, how do we fix it, who is responsible, and do we notify our customers, investors, and shareholders. At Flayton’s, there has been a possible data breach. Their main concern tramples on what is their obligation to their customers to protect their private data. Next, they want to know how to notify their customers of the potential security breach. Then, they want to know if Flayton Electronics’ brand has been damaged by the security breach. Finally, Flayton needs to put in place procedures to prevent future security breaches. Evaluate the obligation Flayton Electronics has to its customers to protect their private data. Flayton Electronics must do everything in their power to protect their customers’ private data. Flayton had implemented a PCI system; however, the system was only running at 75% when it should have been at 100%. There was also a problem with their firewall. Sergei stated that they had to keep turning the system on and off because of glitches. The American Heritage Dictionary......

Words: 1706 - Pages: 7

Free Essay

You Are Being Watched, Essay

...content of the article, made me think a lot, so I decided to write this letter, with my opinion on this topic. It kind of surprised me, that so many CCTV cameras were estimated in Britain. Four million is a lot of cameras! As I continued my reading, I came across all the pros and cons about the cameras. Surveillance in stores and public places makes completely sense to me. If stores didn’t have cameras, I think there would be a higher risk of stealing. Mostly because there wouldn’t be any credible evidence, that he or she actually stole this thing. The stealer could in theory just contradict, if someone had seen the person steal the object. I don’t think an eyewitness would be proof enough, in something as harmless, as an unarmed shoplifting. Assault and blatant or armed stealing are on the other hand, situations where an eyewitness maybe could be trustworthy. Here is surveillance at public places also a really good thing. If someone got assaulted, the cameras could help you identify the assailant. In that way it helps the police fighting crime. I think it makes a lot of people feel safe, when they socialize in public places. Because when there are cameras everywhere, you don’t want to do something illegal, because you know you are being watched. I’m sure we all once in our lifetime have spotted a surveillance camera and got a little but nervous. Kind of like the feeling you get when you see a police car, while you’re driving. I can’t stop thinking about if......

Words: 537 - Pages: 3

Premium Essay

Hbr Flayton Caso

...Electornics fue dañado (reputación, finanzas, operaciones, etc) por esta fuga. • Recomiende 2 procedimientos para que Flayton Electronics prevenga fugas futuras. • Su trabajo debe incluir portada y referencias (no se cuentan como parte de la extensión). Fecha de entrega: 15 de Agosto 2013 11:55pm Via correo electrónico formato PDF. Miguel Laurent 719 col. Del Valle CP 03100 Benito Juárez, México DF tels. 5604 2178 5688 3512 www.univdep.edu.mx www.hbrreprints.org HBR CASE STUDY AND COMMENTARY How should the Flayton Electronics team respond to the crisis? Four commentators offer expert advice. Boss, I Think Someone Stole Our Customer Data by Eric McNulty • Reprint R0709A Flayton Electronics learns that the security of its customer data has been compromised—and faces tough decisions about what to do next. HBR CASE STUDY Boss, I Think Someone Stole Our Customer Data by Eric McNulty COPYRIGHT © 2007 HARVARD BUSINESS SCHOOL PUBLISHING CORPORATION. ALL RIGHTS RESERVED. Brett Flayton, CEO of Flayton Electronics, stared intently at a troubling memo on his desk from the firm’s head of security. Running his hands through his full head of barely graying hair, he looked not unlike his father did when he established the first Flayton Cameras and Stereos 25 years ago. The security situation had come to Brett’s attention just before nine o’clock...

Words: 6346 - Pages: 26

Premium Essay

Should We Pay Ncaa Athletes

...that has been up for hot debate is that should NCAA Student Athletes be paid or not. I will start with the NCAA reasoning on why not to, and switch to the Student Athletes point of view. The NCAA is a nonprofit organization that is used as a control for all college athletics. If you are skilled enough to play Division I you can be offered a Scholarship to go to the school that offered the scholarship for free, or for however much the scholarship is worth. The NCAA believes that this is payment enough for the Student Athletes, and should suffice for the players offering their services to generate revenue for their school. Not only does the School provide free or discounted education to these Student Athletes, but it also offers the number one recruiting ground for professional sports (NFL & NBA). Even with all of this I don’t believe the NCAA would put up such a big fight against paying its Student Athletes if Football and Basketball were the only sports played in college. Though Division I Football and Basketball generate ridiculous revenue numbers, they are the only sports that are profitable. There is no easy way to just say we will allow Football and Basketball players to be paid, but tough luck for all other sports; including division II and III. Don’t jump to the NCAA’s side just yet. The players have just as much reason to think they should be paid. First off, NCAA division I football nationally generates 12 billion dollars a year. That’s like taking the......

Words: 610 - Pages: 3

Free Essay

Damien Hirst

...so-called spin paintings (Beautiful Spill of Light in Destitute Blackness Painting, 2005), the spot paintings, and installations such as My Way, (1990-1991, bottles on a shelf) and a room-sized project called Pharmacy (1992). He has exhibited artwork made with butterflies, and is noted for shocking the public by using human skulls. Hirst also has been accused of plagiarizing other artists’ ideas. One of Hirst’s most famous works is called the Physical Impossibility of Death in the Mind of Someone Living (1991), a dead tiger shark floating in preserving fluid. It is part of the series known collectively as his “Natural History” works that includes fish, sheep, pigs, cows and calves suspended in formaldehyde. He has said of these works that he wanted “to make people think, not to totally shock the shit out of them for the sake of it” (Chaundy, “Damien Hirst: Shockaholic”). The Physical Impossibility of Death in the Mind of Someone Living was displayed at the Metropolitan Museum of Art in New York for three years. It looks like it would be more at home in the Smithsonian. Or a horror movie. It was commissioned in 1991 by Charles Saatchi, an art collector and one of Hirst’s biggest promoters. Saatchi sold it 13 years after it was completed to an American hedge fund manager for $12 million (Lacayo, “Damien Hirst: Bad Boy Makes Good”). [pic] Another type of art that Hirst is known for are his medicine...

Words: 1442 - Pages: 6

Free Essay

Chapter 2 Study Lesson

...know I struggle with a lot of things going on around here. So help us all to understand what this all means. Amen Pastor: Thanks, Connie. I appreciate the word, struggle, that you used. It probably describes where a lot of us seem to be these days. All week long I've had Yvonne's comment rattling around in my head. Yvonne: Did I say something wrong? What? Pastor: Well, you didn't say anything wrong, Yvonne. But what you did say was a heads-up to me about the way we've been taught to think about the church. Yvonne: So what did I say? Pastor: You don't remember? I can't forget it. You said something like, 'All I want to know is who stole my church. I'd like it back'. Ernie: I remember what Yvonne said. I told Gretchen about it, and she said she felt the same way. Pastor: Well, I suppose a lot of us could say the same thing. Maybe we all have the feeling that our church, at least the version of the church we like the most, has been hijacked. EVERYONE SPEAKING AT ONCE------ Varying opinions about whether the word steal was appropriate. Stan: (in a loud enough voice to bring everyone back together) If the people who stole the church-----Yvonne's word, not mine---are younger or newer people, then let 'em steal it. It's going to be theirs in a few years anyway. I vote we give it to them and go off and start our own. SEVERAL PEOPLE GROAN Arlene: Stan, get a life! Pastor: Here's my problem. Yvonne said, 'someone......

Words: 2240 - Pages: 9

Premium Essay

A Good Man Is Hard To Find Analysis

...“good” is through the grandmother in the story. We get the idea in the story that the grandmother is almost better than everyone else or at least she thinks that she is better than everyone else. Changing vacation plans because she doesn’t want to go to the original location, smuggling a cat even though she is told not to, lying to get what she wants. To most this does not sound like “good”. I think that grandma believes that this is “good”. Grandma is under the false impression that she is good. She gets what she wants acting how she is, so she thinks nothing of the way she acts. We again learn about good at the gas station when the clerk talks about how people didn’t pay...

Words: 539 - Pages: 3

Premium Essay

Psy 220 Wise Judgement

...knowledge is the second component to making a wise judgment. In this component, one must come up with ways to deal with the situation without conflict. One must offer advice without sounding controlling or demanding of the other person. The mother must explain to the child that what she did was wrong and that instead of just taking something, ask for it. The daughter may not always get what she wants but she did not commit a crime by just taking something without paying for it. Lifespan contextualism is another component to making a wise judgment. In this component one must be aware that life changes on a daily basis and each situation must be handled in a different way. Throughout life, one will have many roles they play in teaching someone how to act or react. In this particular scenario, the mother must set an example for the child. In doing that the child will know as she grows older that stealing is not acceptable and is not a good decision. The fourth component to making a wise judgment is recognition and management of uncertainty. Knowing that not everyone knows everything and what...

Words: 1055 - Pages: 5

Premium Essay

What Is Ethical to You?

...ethical for you? I think being ethical is when you recognize the good and bad things that a person might cause or do, which may lead to a chaotic or peaceful environment. Ethics can also be defined as being able to distinguish between acceptable and unacceptable behaviour. Majority of the people learn on how to be ethical at their homes, schools and in churches by interacting with others and correcting them, when they have done an unacceptable behaviour. Also most people acquire their sense of doing what is right and wrongful doings during our childhood, a person’s morality develops at different times and stages of their growth as they mature. Ethical values can be found everywhere that some people might consider it as commonsense. But even that some people regard ethical values commonsense, still some people have issues or questions the disasters that some people do to our environment and society. A possible cause of people who are still doing unacceptable behaviors is the misinterpretation and application of these ethical values. For example: a person stole a wallet full of money, so that his starving family can eat for a day or two. That person stole a wallet which means that person did an unethical deed, but he only did that just to feed that persons starving family which is a good thing but in a wrongful doing. Society these days have legal rules or law that conduct policies to control the behavior to those who lives in that particular area. I think that laws or......

Words: 446 - Pages: 2

Free Essay

Essay #2

...Abler 1  Alice Abler  Philosophy 10  Philosophical inquiry #2  Johnston  MW 11:40  Word count: 1355    If there is a philosophical question that will be debated over until the end of time, it will  be the existence of god. In debating the existence of god, we must consider all arguments for and  against whether or not god exists. The most commonly debated argument when arguing against  god is the problem of evil. Evil is defined as the existence of human pain and suffering. If there  is a god, and this god is all loving, all knowing, and omnipotent then how can there be evil in the  world? How could a god allow human pain and suffering where seemingly none is deserved?  There are many arguments retorting to this, but two stand out. First, God created the best  possible world. Evil plays an important role in our world, the world is better off with some evil  than it could be with no evil. Second, moral evil on our planet is due to human free will. Since  God gave us freedom, which is a necessity of a perfect world, it is the fault of humans that moral  evil exists. It is the combination of these two arguments that prove god and evil can coexist. In  disproving the validity of the “problem of evil” we only need to prove the possibility that god  could coexist with evil. We should also note that there are two different types of evil; natural evil  which includes natural disasters, and moral evil which involves humans causing pain and  suffering upon other......

Words: 1367 - Pages: 6

Premium Essay

A Comparative Essay

...“Love in L.A.” vs. “A Good Man Is Hard to Find,” Comparative Essay Amy E. Peche LITR201-1304A-04: Literature: A Reflection of Life Colorado Technical University Prof. Eric Wright October 18, 2013 Abstract No two stories are ever the same, there may be a ton of similarities between the two but unless they are mere copies of each other, they are different. Two stories can be based in two completely different settings, have two different tones, and completely different characters, but they could expose the same message to the readers. Throughout this paper, I will discuss how “Love In L.A.,” and “A Good Man Is Hard To Find,” is similar, different, what their settings are, describe their characters, tone and reveal their messages. A Brief Overview “Love in L.A.” and “A Good Man Is Hard To Find,” are two short stories that portray the characters as arrogant, self-centered, triumphant people, but allows the readers to envisage the true demise of the characters from the beginning. “Love in L.A.,” revolves around a young man in his mid-twenties who goes by the name Jake. In the beginning of the story, you can tell that Jake is an unemployed jerk, which only cares about what he can get for everyone else, without having to lift a figure; he does not care what the cost may be as long as it does not cost him anything. He is the true definition of a con artist, he does not care about anyone other than himself, he is extremely shallow, and in......

Words: 1940 - Pages: 8

Premium Essay

Stealing

...Shakespeare – contrast the creative and social with the destructive and anti-social. Ambiguity – last line of the poem Persona created and we hear the voice of a fictional character What sort of person is it? Does this poem read like a confessional? They are trying to explain their actions. What drives/motivates the speaker? What does the speaker think of himself/herself? What gender do you think the persona is? Explain your idea. “The slice of ice/within my own brain” suggests that the brain is cold. What other evidence is there in the poem which reveals how the speaker feels/thinks? He speaks of the snowman almost with affection, but he cares more for this than the children who have made it. The thief is morally confused – he sees “not taking what you want” as “giving in” as if you might as well be dead as accept conventional morality. He alienates us because he says that he enjoyed taking the snowman because he knew that it would upset the children. “Life’s tough” to justify this. How does the first line suggest that this is part of a conversation? The thief begins as if repeating a question someone has asked him, to...

Words: 1316 - Pages: 6