Skip to content

Commit 70c6f78

Browse files
Update case-study-challenge-navigating-stakeholder-and-decision-making-challenges.mdx
1 parent 7dc39c0 commit 70c6f78

File tree

1 file changed

+2
-12
lines changed

1 file changed

+2
-12
lines changed

tech-far-hub/content/resources/case-studies/case-study-challenge-navigating-stakeholder-and-decision-making-challenges.mdx

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,9 @@ Review the case study background information, key stakeholders, problem identifi
2828
Consider how you will distribute the case study exercise to learners.
2929
- **For an in-person, facilitator-led experience**, the case study can be printed and shared with learners before a live session to allow time for review. Links to additional resources are provided within the case study, so learners may need devices to access these online resources.
3030
- **For a virtual facilitator-led format**, electronic versions of the case study may be distributed for download or online viewing.
31-
> [!TIP]
32-
> Facilitator Tips: Throughout the case study exercise, you will see Facilitator Tips in “tip” alert blockquotes that provide guidance for facilitators to further engage learners.
31+
> **Facilitator Tips:** Throughout the case study exercise, you will see Facilitator Tips in “tip” alert blockquotes that provide guidance for facilitators to further engage learners.
3332
34-
> [!IMPORTANT]
35-
> Learner Reflection Exercises: There will also be points where focused reflection will be suggested in “important” alert blockquotes, and the facilitator can naturally weave those into the activities.
33+
> **Learner Reflection Exercises:** There will also be points where focused reflection will be suggested in “important” alert blockquotes, and the facilitator can naturally weave those into the activities.
3634
#### Introduce the Case Study Exercise
3735
##### Case Study Overview
3836
Share the case study below, highlighting the purpose, key issues, stakeholders, and the problem to be solved. Clearly state the learning objectives and the objectives for each milestone.
@@ -54,7 +52,6 @@ After reading the scenario, you will consider three key questions and use them t
5452
- How can Casey mediate stakeholder concerns to reach a consensus?
5553
#### Milestone Exercises
5654
You will complete this case study analysis through several milestone exercises leading to a final proposed solution presentation. Each milestone exercise will be reviewed with your peers and your facilitator. As your analysis progresses, you will use new information uncovered from each milestone to form your final opinion on the appropriate approach to solving the problem presented. There are five milestone exercises: (1) Stakeholder Analysis, (2) Evaluation of Integration Solutions, (3) Evaluation of Data Security Solutions, (4) Written Case Study Analysis, and (5) Final Presentation.
57-
> [!TIP]
5855
> **Facilitator Tip:** Encourage learners to take notes throughout their case study analysis and capture research information. One method to use is the Split Page strategy. using the left side of a page to capture details from the case study and the right side to document notes, research, and ideas.
5956
## The Challenge
6057
Globally, government agencies have been moving to cloud computing, using cloud-based services from outside vendors to allow them to serve their customers more easily and streamline their systems.
@@ -69,7 +66,6 @@ The [Chief Information Officers Council](https://www.cio.gov/about/vision/#:~:te
6966
Adopting cloud-based systems has its benefits, including centralized access across distributed agencies and teams, streamlined data flows and consolidated information, and smoother service experiences. However, there are also significant drawbacks that cloud computing technologies present, such as security breaches, regulatory compliance, and infrastructure challenges.
7067
Target users for the new system would be broad, including budgeting, contracting, test and evaluation, logistics, human resources, and more. Experience with using and adopting such a system would also vary depending on the agency’s and individual’s experience using these tools.
7168
The process of acquiring new digital assets like this is a complicated one. Unlike the private sector, the level of coordination and collaboration necessary to ensure the successful adoption within the federal government requires involving many key players and stakeholders, including a CO, a Program Manager (PM), Information Technology (IT), Compliance Officers, and others. Some challenges that can complicate the collaboration across these stakeholders include communication, risk assessment, cost, timelines and schedules, performance, defining requirements, contract type, and solicitation methods. Navigating these complexities requires an analytical mindset to consider many competing priorities and needs of each stakeholder.
72-
> [!TIP]
7369
> **Facilitator Tip:** In the next section, learners are introduced to the players in the scenario. Learners may not be given all the information up front. Remind learners that as they work through the case study, research and other activities may uncover additional information.
7470
### The Players – Part I
7571
#### Acquisitions Office: Casey
@@ -83,7 +79,6 @@ As Casey left a recent meeting with agency leadership, having received the assig
8379
Having managed several large IT acquisitions before, Casey knows coordination starts with two key groups: the IT department and Compliance Officers. Casey has a long-standing relationship with both of these departments and a few close colleagues who may be allies as they work through the process.
8480
The challenges of the acquisition aren't just about technicalities. Casey was acutely aware that this project would have ripple effects—some beneficial, some dangerous. If successful, Casey would solidify their standing as a top specialist, potentially opening doors to career advancement. But failure could attract congressional scrutiny and public outcry, not to mention the internal politics of the agency, where trust had been hard-earned. In any contracting endeavor, vendors who are not selected or those that do not meet small business requirements may post challenges.
8581
Through recent training, Casey has learned that when negotiating among stakeholders, it’s important to take an empathetic approach, making sure each stakeholder feels heard and understood throughout the decision-making process.
86-
> [!IMPORTANT]
8782
> **Learner Reflection Exercise:** How can Casey use empathy when talking with key stakeholders? How might a lack of empathy create conflict among stakeholders when discussing their concerns?
8883
#### The IT Department: Alex
8984
Alex also has had a long career within IT, transitioning to the federal government several years ago after many years in the private sector, where innovation was faster and less bogged down by bureaucracy. The federal government is an entirely different beast. Alex hears reports from the Chief Information Officers Council and the progress they’re making toward the Cloud Smart initiative. While Alex is familiar with it, adoption has been slow across agencies, so direct experience with how such tools integrate into the existing systems is limited. The IT department knows that implementing these solutions has become a priority for many agencies, but integrating cloud-based systems into the agency’s legacy infrastructure would be a logistical nightmare. To try to anticipate the challenges these new solutions may present, Alex and the IT team have conducted some preliminary research into the implications of a cloud-based system, but have not shared their findings broadly.
@@ -96,7 +91,6 @@ Casey nods, recalling the murmurs of discontent from employees whenever anything
9691
Alex notes that their experience with adopting cloud-based software has been limited so far. With the newness of the initiative, most agencies haven’t gotten as far as the acquisition process.
9792
“I just keep thinking about this integration challenge,” Alex continues. “There’s been some recent interest and movement, though, that might help you.” Alex shares that the Information Technology Category and Cloud Solutions Category Teams have also been working with the OMB to support centralizing information about cloud initiatives and resources for procurement. From that work, they’ve formed the [Cloud Information Center (CIC)](https://cic.gsa.gov/) and have specifically outlined [information for acquisitions](https://cic.gsa.gov/acquisitions/overview). Alex suggests Casey start there for more information on how this impacts the project.
9893
“We’re going to need to bring in Compliance, though. We won’t get far without them. The good news is, we work pretty closely with each other, so I know where to take this next.” Casey asks to be part of those conversations. “It’ll be easier if I meet with the Compliance Officer myself. We can usually come to a consensus pretty easily. I’ll report back with our thoughts.” Casey is mildly concerned and a little put off by the limited engagement with the two teams, but trusts the professional nature of their relationship and knows Alex will perform due diligence.
99-
> [!IMPORTANT]
10094
> **Learner Reflection Exercise:** If the next step is a meeting with the Compliance Officers, what is the desired outcome from the meeting, and what should Alex come prepared to discuss? Are there any risks to consider?
10195
### The Players – Part II
10296
#### Compliance Office: Riley
@@ -130,14 +124,12 @@ integration but requires substantial investment and may disrupt operations.
130124
With these proposed solutions in mind, Casey researches some industry white papers and reports, case studies, vendor documentation, academic papers, and IT cost management studies, and finds that:
131125
- **Quantitative data:** Custom APIs will cost 20% more and take 30% longer to implement than system upgrades. Advanced encryption could add 15% overhead to system performance, while regular audits would require additional staffing and resources.
132126
- **Qualitative data:** The IT department suggests custom APIs provide long-term stability but at a higher initial cost. Compliance officers emphasize that advanced encryption is critical for federal data protection requirements, while regular audits are easier to manage but require ongoing attention.
133-
> [!IMPORTANT]
134127
> **Learner Reflection Exercise:** There is often more than one possible solution to satisfy the stakeholders and requirements. Are there other solutions Casey has not yet considered?
135128
### Facilitator Instructions
136129
#### Group Discussion
137130
After learners have read the complete case study, break the group into small teams. Encourage them to identify the main problem(s), analyze the stakeholders involved and their competing priorities, explore the root causes of the issues (including logistical and personal), and develop additional potential solutions.
138131
Alternative delivery modes: If delivering the exercise in a virtual experience, teams can be created using virtual breakout rooms. If delivering asynchronously, use tools such as discussion boards to encourage collaboration and discussion among the team members.
139132
After teams have had time to discuss, bring them back together to share their insights with the larger group. Provide feedback or pose additional questions to encourage learners to explore other perspectives or alternative solutions.
140-
> [!TIP]
141133
> **Facilitator Tip:**
142134
> - Circulate between groups (if delivering in person) or among breakout rooms (if delivering virtually).
143135
> - Each milestone activity has a suggested percentage representing the relative proportion of time to spend on that activity. Adjust actual timing accordingly.
@@ -202,7 +194,6 @@ Your analysis will be assessed on your group’s ability to address stakeholder
202194
- **Stakeholder Management:** Facilitate ongoing discussions with IT and Compliance teams to address concerns and update on progress.
203195
- **Integration:** Opt for custom APIs to integrate with legacy systems, allocating additional resources for development.
204196
- **Data Security:** Implement advanced encryption and schedule regular security audits to ensure protection and compliance.
205-
> [!TIP]
206197
> **Facilitator Tip:** While each milestone could be completed independently asynchronously using the resources provided, ideally learners will present their analyses to the other groups to collect perspectives and feedback from their peers.
207198
## Evaluation & Feedback
208199
### Learner Instructions: Evaluation Criteria
@@ -212,7 +203,6 @@ The facilitator will evaluate each group’s analysis and presentation on a scal
212203
- **Use of Evidence and Resources:** This criterion evaluates the extent to which the analysis is backed by credible evidence. It considers how well the analysis integrates data, facts, and research findings to support its arguments and conclusions. Strong use of evidence strengthens the credibility of the analysis.
213204
- **Creativity and Originality:** This criterion assesses the uniqueness and innovativeness of the analysis. It considers whether the analysis offers new insights, creative solutions, or a fresh perspective on the case. Original thinking can add significant value to the analysis.
214205
- **Clarity and Organization:** This criterion focuses on how clearly and logically the analysis is presented. A well-structured analysis should have a clear introduction, body, and conclusion, with each section flowing logically from one point to the next. The clarity of writing and the organization of ideas are key factors here.
215-
> [!TIP]
216206
> **Facilitator Tip:** Individualized feedback will help learners refine their approach as they prepare for the final presentation. Share that:
217207
> - Balancing stakeholder concerns involves considering both technical feasibility and regulatory requirements.
218208
> - Effective stakeholder engagement and communication are crucial for resolving conflicts and reaching consensus.

0 commit comments

Comments
 (0)