Skip to content

Commit 7dc39c0

Browse files
Update case-study-challenge-navigating-stakeholder-and-decision-making-challenges.mdx
Updated per @frank-mcnally's review
1 parent 8e0c3cf commit 7dc39c0

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

tech-far-hub/content/resources/case-studies/case-study-challenge-navigating-stakeholder-and-decision-making-challenges.mdx

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,7 @@ As Casey left a recent meeting with agency leadership, having received the assig
7979
- How will I establish effective communication among all of these stakeholders?
8080
- Do I need a communication plan, risk management plan, or charter?
8181
- What might the other teams involved be cautious of when approaching this?
82+
8283
Having managed several large IT acquisitions before, Casey knows coordination starts with two key groups: the IT department and Compliance Officers. Casey has a long-standing relationship with both of these departments and a few close colleagues who may be allies as they work through the process.
8384
The challenges of the acquisition aren't just about technicalities. Casey was acutely aware that this project would have ripple effects—some beneficial, some dangerous. If successful, Casey would solidify their standing as a top specialist, potentially opening doors to career advancement. But failure could attract congressional scrutiny and public outcry, not to mention the internal politics of the agency, where trust had been hard-earned. In any contracting endeavor, vendors who are not selected or those that do not meet small business requirements may post challenges.
8485
Through recent training, Casey has learned that when negotiating among stakeholders, it’s important to take an empathetic approach, making sure each stakeholder feels heard and understood throughout the decision-making process.
@@ -116,17 +117,15 @@ Riles continues, “From a security perspective, whether we update legacy system
116117
“This might help avert security threats, but encryption would slow everything down. Increased latency, more storage issues, and potential performance crashes. My team has to handle all of that and we just can’t take those hits.”
117118
Both Alex and Riley believe that their concerns should be the driving influence on the decision-making process.
118119
### Potential Pathways for Solution Development
119-
departments are adamant that their concerns should shape the decision-making process. But
120-
Casey, with a calm and steady hand, begins to steer the group toward a middle ground. As a
121-
group, they determine that there are two options to address each of the larger issues: Integration
120+
As the weeks go by, the tension between Alex and Riley simmers just beneath the surface. Both departments are adamant that their concerns should shape the decision-making process. But Casey, with a calm and steady hand, begins to steer the group toward a middle ground. As a group, they determine that there are two options to address each of the larger issues: Integration
122121
and Data Security.
123122
1. **Integration Issues:**
124-
- **Solution A:** Develop custom Application Programming Interfaces (APIs) to integrate the CRM with existing legacy systems. This option is tailored but involves higher costs and longer development time.
125-
- **Solution B:** Upgrade legacy systems to improve CRM compatibility. This simplifies
123+
- **Solution A:** Develop custom Application Programming Interfaces (APIs) to integrate the CRM with existing legacy systems. This option is tailored but involves higher costs and longer development time.
124+
- **Solution B:** Upgrade legacy systems to improve CRM compatibility. This simplifies
126125
integration but requires substantial investment and may disrupt operations.
127126
2. **Data Security Concerns:**
128-
- **Solution A:** Implement advanced encryption and access controls. This ensures strong protection but may affect system performance.
129-
- **Solution B:** Conduct regular security audits and updates. This maintains data protection standards with fewer immediate impacts on system performance.
127+
- **Solution A:** Implement advanced encryption and access controls. This ensures strong protection but may affect system performance.
128+
- **Solution B:** Conduct regular security audits and updates. This maintains data protection standards with fewer immediate impacts on system performance.
130129
#### Data and Evidence
131130
With these proposed solutions in mind, Casey researches some industry white papers and reports, case studies, vendor documentation, academic papers, and IT cost management studies, and finds that:
132131
- **Quantitative data:** Custom APIs will cost 20% more and take 30% longer to implement than system upgrades. Advanced encryption could add 15% overhead to system performance, while regular audits would require additional staffing and resources.
@@ -147,10 +146,12 @@ After teams have had time to discuss, bring them back together to share their in
147146
- How can Casey balance the cost and time implications of custom integration solutions?
148147
- What strategies can ensure data security measures do not impact system performance?
149148
- How can Casey mediate stakeholder concerns to reach a consensus?
149+
150150
**Completing the Analysis:** To complete this case study analysis exercise, you will further analyze the case study and complete a series of milestones. Each milestone provides an opportunity to consider the case study from a new perspective.
151151
- For **Milestones 1, 2 & 3**, you will use various analysis tools to develop a deeper understanding of the stakeholders, their challenges and needs, and the benefits and drawbacks of the proposed solutions.
152152
- For **Milestone 4**, you will complete a written analysis of the case study and develop your proposed innovative solution, using the details from the case study and the additional resources to support your findings.
153153
- For **Milestone 5**, you will develop a presentation slide deck to summarize and deliver your final findings.
154+
154155
**Additional Resources:** Consider these additional resources as you complete each milestone:
155156
- Integration feasibility report and cost analysis
156157
- Data security assessment and encryption impact study

0 commit comments

Comments
 (0)