Determine the types of risk and product-related

Assignment Help Management Information Sys
Reference no: EM131945197

"Risk Management" Please respond to the following:

From the e-Activity, suppose that you were the engineer that designed this type of car and you were thinking about operational risk management.

Determine the types of risk, product-related or process-related, that you would consider when it comes to the operation of the car in public parking spaces. Defend why you would consider this type of risk.

Imagine that you have been contracted to work on a given project for which you have elicited requirements from stakeholders.

However, there are inconsistencies in the documentation you were given, incomplete descriptions of processes, and interviewees have given you conflicting information.

Propose a solution to resolve these inconsistencies and conflicting information using techniques discussed in the textbook.

Classmates:

From the e-Activity, suppose that you were the engineer that designed this type of car and you were thinking about operational risk management. Determine the types of risk, product-related or process-related, that you would consider when it comes to the operation of the car in public parking spaces. Defend why you would consider this type of risk.

The recommended type of risk is product-related risk. Cybersecurity risks are still an issue for cars with advanced technology. For example, one type of risk that Ford should consider is how vulnerable the system is to hacking. Hacking of cars with advance technology do not always happen. However, movies such as the Fast and Furious: Fate of the Furious movie, make the point that automobile manufactures need to implement appropriate cybersecurity protections.

A relatively recent example of a vehicle being hacked, was when a car with Bluetooth technology allowed a cybercriminal to gain unauthorized control to the motor vehicle. These intrusion attempts do not always happen because cybercriminals would have to be close by due to the limited range of Bluetooth. If this was in a parking lot, someone would notice something. However, it does point out the need to implement appropriate cybersecurity measures when new technology is installed in motor vehicles.

Imagine that you have been contracted to work on a given project for which you have elicited requirements from stakeholders. However, there are inconsistencies in the documentation you were given, incomplete descriptions of processes, and interviewees have given you conflicting information. Propose a solution to resolve these inconsistencies and conflicting information using techniques discussed in the textbook.

Recommended solutions to resolving the inconsistencies is to use a glossary and define the requirements by analyzing differences in stakeholder objectives. Glossaries of terms and concepts relating to documentation, descriptions, and interviewee information can make operational and technical requirements more precise. According to Lamsweerde (2009), "Such a glossary should provide a precise, intelligible definition of all terms used and, for some of them, a list of accepted synonyms" (p. 88).

Inconsistencies with employee information can be made more precise through clarification of stakeholder objectives and priorities. According to Lamsweerde (2009), a recommended approach is to define requirements by analyzing the differences of stakeholder objectives, such as the risks and uncertainties of the objectives. Once these differences are analyzed, a mutually agreed set of objectives can be negotiated so that requirements are clear and precise.

Reference no: EM131945197

Questions Cloud

Describe the needs identification : Describe the differences between needs identification and defining commercial equivalents and discuss why it is preferable to separate into two stages.
Explain a recent well published cyber-attack or breach : Research and explain a recent well published cyber-attack or breach. Also, provide a recommendation for improving incident response.
Estimate the mean weight gain : Estimate the mean weight gain after 21 days for chicks fed high-lysine corn.
How to add resources to a project : How to create a WBS in Microsoft Project. How to add resources to a project? Download and open the following Project template Preview the document.
Determine the types of risk and product-related : Suppose that you were the engineer that designed this type of car and you were thinking about operational risk management.
Drug pharmacokinetic properties : Write your conclusions from this and the previous exercise in the context of the drug's pharmacokinetic properties.
How is marriott segmenting the market for hotel services : How is Marriott segmenting the market for hotel services? Which of the three targeting strategies is Marriott using? Explain your answer.
Determine which diagram you are most likely to use : You have completed the elicitation and evaluation phases and now you need to specify and document the system-to-be.
What will be the amount of each repayment : If the interest rate is 6.5% per annum compounding monthly, what will be the amount of each repayment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd