Wednesday, May 1, 2019
BOGART - A CASE IN POINT Study Example | Topics and Well Written Essays - 1000 words
BOGART - A IN POINT - Case cultivation ExampleWhen their scheme was identified the men had managed to leave the premises with sensitive and basic information involving the B.I.D. program. The trouncing ultimately cost the company, approximately, 1,000,000 dollars to recover, repair, and pay the necessary technicians to fix the damages and eliminate the self destruct booby-traps they had set. These cost amounted to, nearly, twice as much as it cost to initially implement and finance the new softwares development. at that place are a number of aspects to the case study here one can criticize Bogarts approaches and practices in relation to this topic. However, at that place are 10 specific changes that would acquire helped the Bogart Company to prevent and proactively conduct with the issues created by the developers. These ten suggestions explain where the Bogart Company went wrong and changes that they could implement that might have prevented problems. These implementations cou ld, also, aid them in deterrence of such issues in the future. 1. Know Your Staff These gentlemen were newly hired and immediately handed an immensely important task it might have been wiser not to put so much faith and obligation in someone whose company loyalties cannot be known. 2. Never Let Em contrivanceees Work on Sensitive Projects at Home These new hired developers should never have been allowed to work from home. Outside the workplace environment there is no way for supervisors, managers, or other faculty to have access to the work that these employees are doing. 3. focussing Need to be involved in Sensitive Projects The development of team involved only these two men involved two others. With such a small team working on something so intrinsically important to the future of the business, there should be a level of involvement form supervisory and management staff. They should have been more heavily present. This, alone, could have had a huge effect on the behaviors of employees. 4. tag and Protect Interests from the Start Once the unique elements of their system had been determined, they should have immediately labeled and guaranteed their rights, earlier on, antecede the copyright efforts of the dishonest employees. 5. Regular In-depth Reviews of the Work The designers were able to encrypt the system with booby-traps that could completely compromise and gag rule the system. It more people had been involved or aware of the process then these employees may not have had the free reign that allowed them to do as they did. Stronger interactive behaviors from supervisors are essential. 6. Make Sure Staff Feels grandness and Loyalty to the Company Be sure to install a sense of importance and relevance to staff contributions, in this way, your staff can be your eyes, ears, and guardians of the companys ethics and standards. In this case, it was the honesty and acuate eye of another employee that identified the designers hidden trademark logo. Had t hat employee, in the case study, not identified that trademark the outcome in this case might be a great deal different (Mayhew, 2013). 7. action Strict Policy from the Start The Company used the signing of stricter security policies as a ploy to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment