Assignment 1: Assess Organizational Readiness
DR. David Bouvin
This assignment involves analyzing how the Critical Success Factors (CSFs) are applied in the Harvard Business Review case study, “Boss, I Think Someone Stole Our Data.” Some examples will be provided in the analysis. The organizational readiness, risk culture, and project benefits will be determined with justification for the assessment. Based on the above results, three project risk recommendations will be presented in this assignment. The initial risk categories (RBS Level 1 and 2) will be presented based on the case study using the Example Risk Checklist (figure A-2 Hillson & Simon text). Analyzing Critical Success Factors (CSFs)
The success of a business or project is mainly determined by its Critical Success Factors. In other words without applying, elucidating these factors a business or project may be doomed to failure (Gray & Larson, 2012). The business dictionary defines CSFs as a range between 3 to 8 items of characteristics, conditions, or variables that have direct and serious impact on the effectiveness, efficiency, and viability of an organization or project (critical success factors, Businessdictionary.com). Critical Success Factors are unique to every project therefore CSF’s are not clearly defined and can be different to each business and project. This case study has several CSFs that indicate that the company must have at least several objectives in order to obtain success. The objectives: customer information is protected by a more secure data system, the customers and the business must have trust remain intact, insurance of becoming PCI compliant, training strategies and communication, security of the wireless inventory-control system, those who have access to information will receive authentication, staff background checks and more competent staff, restore company name by rebranding the strategy and the company should have a firm communication policy on how to handle these types of issues for each state in which it operates. Security breaches are some of the most common ways to get information in today’s technological society and most breaches are perpetrated by insiders/employees who gain unauthorized access or those who have erroneously earned the trust of a company or manager (Schneider, 2010). Flayton Electronics faced many issues during the when it started because the CSF’s were not properly outlined from the beginning. If these CSF’s would have been properly outlined many of the issues could have been avoided. An example of this is in the review it, the owner contemplates whether he moved too quickly with his ambitions and expansion of the company without consideration of customer protection, brand protection, his staff and technology/security. In the expansions if a solid project plan that included ATOM had been incorporated along with a plan for a knowledgeable security team, many of the issues would have not taken place. The security officer in place for example has more knowledge of physical security versus electronic or data security. In the data spectrum Flayton did not protect itself. The problem with the hole in the firewall was mainly because of Sergei who was well aware of the issues with the computer system but chose to ignore the problems rather than admit there were issues with the system. Sergei was well aware of how to avoid detection from monitoring but decided to do so operating PCI at 75%. Flayton built his reputation and brand on trust and offered customers fair deals. Loss of a company’s brand or reputation could spell destruction for the company and loss of its customer base (McNulty, 2012, p.2-5). Employees have unnecessary access to computer information and input due to an apparent incident with pornography. Enormous issues with wireless-inventory that need to be repaired as they could be the weakest point in the system of...
References: critical success factors (CSF). BusinessDictionary.com. Retrieved April 23, 2013, from BusinessDictionary.com website: http://www.businessdictionary.com/definition/critical-success-factors-CSF.html
Downs, C.W. (2004). Assessing Organizational Communication: Strategic Communication Audits. New York, NY: Guilford Press
Gray, C., & Larson, E
Hillson, D. & Simon, P. (2012). Practical manager’s spotlight on risk management: The Atom methodology (2nd ed.). Vienna, VA: Management Concepts.
McNulty, E. (2012). Harvard Business Review: “Boss I Think Someone Stole Our
Customer Data (HBR Case Study and Commentary)”
Schneider, G.P. (2010). Electronic Commerce: 2010 custom edition (8th ed.) Mason, OH:
Kloppenburg, T., Sheinberg, A., & Venkatraman, J. (2003). Project leadership. Vienna, VA: Management Concepts, Inc.
Lewis, J. (2003). Project leadership. Boston: McGraw-Hill.
Please join StudyMode to read the full document