Business Management

Analysis and discussion of Case Study 1- Jennifer Consultant

You can download the solution to the following question for free. For further assistance in Business Management assignments please check our offerings in Accounting assignment solutions. Our subject-matter experts provide online assignment help to Accounting students from across the world and deliver plagiarism free solution with free Grammarly report with every solution.

(ExpertAssignmentHelp does not recommend anyone to use this sample as their own work.)

Word Count

2800 words

Subject

Corporate Governance

Deadline

5 Days

Assignment Criteria

Read the 3 Case Studies below and select ONE as the basis of your analysis and discussion. Please indicate clearly which Case Study you have chosen 

Case Study 1 – Jennifer the Consultant 

Three years ago Jennifer started her own consulting business. She has been so successful that she  now has several people working for her and many clients. Their consulting work include.sd advising  on how to set up corporate intranets, designing database management systems, and advising about  security. 

She is currently designing a database management system for the personnel office of a medium sized company. Jennifer has involved the client in the design process, informing the CEO, the  director of computing, and the director of personnel about the progress of the system. It is now  time to make decisions about the kind and degree of security to build into the system. Jennifer has  described several options to the client. Because the system is going to cost more than previously  planned, the client has decides to opt for a less secure system. Jennifer believes that the  information they will be storing is extremely sensitive. It will include performance evaluations,  medical records for filing insurance claims, salaries and so forth. 

With weak security, employees working on client machines may be able to figure out ways to gain  access to this data, not to mention the possibility of online access from hackers. Jennifer feels  strongly that the system should be more secure. She has tried to explain the risks, but the CEO,  director of computing and director of personnel all agree that less security will do. 

What should she do? Should she refuse to build the system as they request?

PE_Assignment1_Set 1 – May 2015 

Case Study 4 – Quality Assurance Case 

A small software company is working on an integrated inventory control system for a very large  national shoe manufacturer. The system will gather sales information daily from shoe stores  nationwide. This information will be used by the accounting, shipping, and ordering departments to  control all of the functions of this large corporation. The inventory functions are critical to the  smooth operation of the system.  

Jane, a quality assurance engineer with the software company, suspects that the inventory functions  of the system are not sufficiently tested, although they have passed all their contracted tests. She is  pressured by her employers to sign off on the software. Legally she is only required to perform  those tests which have been agreed to in the original contract. However, her considerable  experience in software testing has led her to be concerned over risks of the system. 

Her employers say that they will go out of business if they do not deliver the software on time. Jane  contends if the Inventory sub-system fails, it will significantly harm their client and its employees. If  the potential failure were to threaten lives, it would be clear to Jane that she should refuse to sign  off. But since the degree of threatened harm is less, Jane is faced with a difficult ethical decision. 

Case Study 7 – Website Links 

Yan is a public servant, he is a web developer within a department of a state government. Yan has  been given responsibility for developing a tourism website by the I.T. Manager Sarah. Yan adds  various links to news services to enliven this government webpage. These links include global news  channels.  

It is later found that those sites sometimes provide news on court cases which are currently under  suppression order here in Australia as they are in process. When noticed this causes huge  embarrassment to the government department. 

Sarah, the I.T manager of the department had not seen the website before it went live but even if  she had it is unlikely that she would have noticed and tested every link. In any case the links were not  problematic until a local court case gave rise to a publication suppression order. 

Sarah now needs to determine who should take responsibility and what actions should be taken  about the event. She needs to prevent recurrence of this type of problem. 

Briefly discuss the dilemma for Sarah. Show your utilisation of either Thomas White or Chris  MacDonald’s methodology to demonstrate how Sarah might analyse and resolve the dilemma.  Provide a recommendation of what actions Sarah should initiate and to whom she needs to  communicate throughout the process. 

Include in your answer those clauses from the ACS Code of Ethics and ACS Code of Professional  Conduct that are relevant and briefly explain why. Refer also to any relevant legislation again with an  explanation of how it relates.

PE_Assignment1_Set 1 – May 2015 

Assignment Task 

From what you have learned during Week s 3 and 4 of your Professional Environments Course,  discuss ethical, professional and legal issues which you consider arise from this scenario. Make some  recommendations of actions which could be taken to resolve the situation and/or to minimise the  chance the scenario may recur. Support your answers with relevant references (as well as the Codes  and Laws). 

Why Choose Us?

Assignment Understanding Brief

Review your requirements with our FREE Assignment Understanding Brief and avoid last minute chaos.

Global PhD Experts

We provide you services from PhD experts from well known universities across the globe.

Free Grammarly Report

No more plagiarism worries. We give you a FREE Grammarly report with every assignment.

Delivery Before Deadline

Our experts work round the clock to provide you with solutions before the scheduled deadline.

Assignment Solution

Introduction:

The major responsibility of the consultant is to provide the best solutions, and information's to the clients. It can help clients to avoid risks and unnecessary problems during business operations. In the current case, also Jennifer is bound by the same responsibilities.  

Clauses and ethical issues: 

One of the clauses, 4.8.2 social implications, of ACS code of conduct, stated that being an ICT professional, there is need for respecting the privacy of other people (Code of Ethics 2016). She has fulfilled her major responsibility that she educated her client about all the security options which they can implement within the company. Jenifer has explained that there are various security systems that can complement with the nature of their data and business as well. She did not hide any service features from their client, which indicate her professional nature. Secondly, she has ensured that she should study the sensitivity of the client’s data and information which shows her competency as per the professional code of ethics (ACS Code of Professional Conduct Professional Standards Board Australian Computer Society 2012). The client stored the information like insurance policies of customers, their details and so on. Here, she fulfilled another clause of ACS code of ethics, 4.5 priorities, that she gives her best to secure the confidentiality of others. 

Thus, she fulfilled her responsibility on the ground of both informing customers and exploring all the risks which are associated with their client's business. She further followed the 4.9 clauses of the ACS code of ethics. She tried to develop the professional environment and most specifically tried to implement 4.9.3, which says that ICT professional should encourage developing ethical and professional development (Code of Ethics 2016). At the same juncture, it could be seen from the case study that Jennifer put her serious efforts to convince the CEO of the company to go for the highly secured system. The CEO was stubborn, but she just informs them about the risks of losing data and easy access from the hackers and so on. It shows her fulfilment of professional conduct related to Honesty and giving preference to the public interest (ACS Code of Professional Conduct Professional Standards Board Australian Computer Society 2012).

Download This Assignment Sample For Free

    This form collects your email so that we can correspond with you through our newsletters. Checkout our Privacy policy for more information.
    Yes, i consent to this conditions.