logo

Assignment 1: Problem-Action-Consequence Technique

6 Pages1546 Words413 Views
   

Added on  2023-06-15

About This Document

This assignment discusses the ethical problems of launching a software product early without proper encryption and suggests project management strategies to prevent such problems. It also identifies the responsible person and affected sector, and proposes the best action to resolve the issue. The implications of the best action on the project's time, cost, and quality, as well as its consequences on the project stakeholders, are also discussed. Subject: Computing and Maths, Course Code: N/A, College/University: Charles Sturt University

Assignment 1: Problem-Action-Consequence Technique

   Added on 2023-06-15

ShareRelated Documents
SCHOOL OF COMPUTING AND MATHS, Charles Sturt University
Early Launch
Your Name
Student Number
Assignment 1: Problem-Action-Consequence Technique_1
Introduction
In the selected YouTube video, it is being seen that a software product would be
launched early without any proper encryption added to it. A software without proper
encryption involved can create problem in the near future relating to the security in the
software. This can make the software vulnerable to hackers who can easily hack the system.
Q1. What are the ethical problems you identified in your chosen YouTube video?
The main ethical problem, which is being identified in the video, is that a software
without any proper encryption is being delivered to the client. The aspect would directly
reduce the security, which is related to the organization when they use the software in the live
environment.
Q2. Why are these ethical problems?
The problem can be termed as ethical problem due to the factor that if the software is
implemented into the live environment without proper encryption it could be vulnerable. The
vulnerable concept would be implemented in the sector of the security of the data. The data
when relating to any organization is very much on the part of private data. If this data is not
secured then it could produce problem and later the working of the overall organization
(Sadeghi et al., 2017).
Q3. Who is responsible for these problems?
The person who is responsible for this issue is the project manager. The project
manager mainly decides what has to be in the software and what should not be incorporated
into the software. In this problem, it was the call of the project manager to deliver the
software early without proper encryption being involved into the process. He had suggested
Your Name
Assignment 1: Problem-Action-Consequence Technique_2
the project director to initiate a patch of the encryption few days after the launch of the
software (Kumar, Khan & Khan, 2015).
Q4. Who is affected by these problems?
The affected sector is the client who would be using the software in the live
environment. The data, which is stored in the software, is liable to be vulnerable for hackers
to indulge into it. This can be stated as a problem as the data can be important and if it goes
into the hand of others, it can affect the working of the organization (Sadeghi et al., 2017).
Q5. What project management strategies could have prevented these problems from
arising in the first place?
There are different project management strategies that can be incorporated into any
project initiation. The different phases, which are involved into the concept, is the initiation,
planning and execution (Pires et al., 2016). Taking into consideration a software development
scheme the best project management scheme that can be implemented is the waterfall model.
This can be considered as a very basic model for the for software model which incorporates
the entire requirement needed in the different phases in development of a software (Scott-
Hayward, Natarajan & Sezer, 2016).
Q6. Which of the three actions in your chosen YouTube video is better? Why?
Among the different options available, which are stated in the YouTube video the best
option that can be used is that the project director ignores the recommendation of the project
manager. This is selected due to the factor that a software without proper encryption involved
into it can be a big problem when the software is presented into a live environment. If any
other person accesses the data in the software, expect the authorized user it could lead to a big
Your Name
Assignment 1: Problem-Action-Consequence Technique_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment 1: Problem-Action-Consequence Technique
|6
|1546
|209

Ethical Issues in Delivering Software Without Encryption: A Problem-Action-Consequence Analysis
|6
|1411
|64

Ethical Problems in YouTube Video: Problem-Action-Consequence Technique
|7
|1632
|295

Action research related to Classroom problems
|6
|1537
|88

Problem Action Consequence Technique: Early Launch
|6
|1629
|318

IT Ethics Assignment YouTube
|6
|1305
|37