You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: tech-far-hub/content/resources/case-studies/case-study-challenge-navigating-stakeholder-and-decision-making-challenges.mdx
+8-7Lines changed: 8 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -79,6 +79,7 @@ As Casey left a recent meeting with agency leadership, having received the assig
79
79
- How will I establish effective communication among all of these stakeholders?
80
80
- Do I need a communication plan, risk management plan, or charter?
81
81
- What might the other teams involved be cautious of when approaching this?
82
+
82
83
Having managed several large IT acquisitions before, Casey knows coordination starts with two key groups: the IT department and Compliance Officers. Casey has a long-standing relationship with both of these departments and a few close colleagues who may be allies as they work through the process.
83
84
The challenges of the acquisition aren't just about technicalities. Casey was acutely aware that this project would have ripple effects—some beneficial, some dangerous. If successful, Casey would solidify their standing as a top specialist, potentially opening doors to career advancement. But failure could attract congressional scrutiny and public outcry, not to mention the internal politics of the agency, where trust had been hard-earned. In any contracting endeavor, vendors who are not selected or those that do not meet small business requirements may post challenges.
84
85
Through recent training, Casey has learned that when negotiating among stakeholders, it’s important to take an empathetic approach, making sure each stakeholder feels heard and understood throughout the decision-making process.
@@ -116,17 +117,15 @@ Riles continues, “From a security perspective, whether we update legacy system
116
117
“This might help avert security threats, but encryption would slow everything down. Increased latency, more storage issues, and potential performance crashes. My team has to handle all of that and we just can’t take those hits.”
117
118
Both Alex and Riley believe that their concerns should be the driving influence on the decision-making process.
118
119
### Potential Pathways for Solution Development
119
-
departments are adamant that their concerns should shape the decision-making process. But
120
-
Casey, with a calm and steady hand, begins to steer the group toward a middle ground. As a
121
-
group, they determine that there are two options to address each of the larger issues: Integration
120
+
As the weeks go by, the tension between Alex and Riley simmers just beneath the surface. Both departments are adamant that their concerns should shape the decision-making process. But Casey, with a calm and steady hand, begins to steer the group toward a middle ground. As a group, they determine that there are two options to address each of the larger issues: Integration
122
121
and Data Security.
123
122
1.**Integration Issues:**
124
-
-**Solution A:** Develop custom Application Programming Interfaces (APIs) to integrate the CRM with existing legacy systems. This option is tailored but involves higher costs and longer development time.
125
-
-**Solution B:** Upgrade legacy systems to improve CRM compatibility. This simplifies
123
+
-**Solution A:** Develop custom Application Programming Interfaces (APIs) to integrate the CRM with existing legacy systems. This option is tailored but involves higher costs and longer development time.
124
+
-**Solution B:** Upgrade legacy systems to improve CRM compatibility. This simplifies
126
125
integration but requires substantial investment and may disrupt operations.
127
126
2.**Data Security Concerns:**
128
-
-**Solution A:** Implement advanced encryption and access controls. This ensures strong protection but may affect system performance.
129
-
-**Solution B:** Conduct regular security audits and updates. This maintains data protection standards with fewer immediate impacts on system performance.
127
+
-**Solution A:** Implement advanced encryption and access controls. This ensures strong protection but may affect system performance.
128
+
-**Solution B:** Conduct regular security audits and updates. This maintains data protection standards with fewer immediate impacts on system performance.
130
129
#### Data and Evidence
131
130
With these proposed solutions in mind, Casey researches some industry white papers and reports, case studies, vendor documentation, academic papers, and IT cost management studies, and finds that:
132
131
-**Quantitative data:** Custom APIs will cost 20% more and take 30% longer to implement than system upgrades. Advanced encryption could add 15% overhead to system performance, while regular audits would require additional staffing and resources.
@@ -147,10 +146,12 @@ After teams have had time to discuss, bring them back together to share their in
147
146
- How can Casey balance the cost and time implications of custom integration solutions?
148
147
- What strategies can ensure data security measures do not impact system performance?
149
148
- How can Casey mediate stakeholder concerns to reach a consensus?
149
+
150
150
**Completing the Analysis:** To complete this case study analysis exercise, you will further analyze the case study and complete a series of milestones. Each milestone provides an opportunity to consider the case study from a new perspective.
151
151
- For **Milestones 1, 2 & 3**, you will use various analysis tools to develop a deeper understanding of the stakeholders, their challenges and needs, and the benefits and drawbacks of the proposed solutions.
152
152
- For **Milestone 4**, you will complete a written analysis of the case study and develop your proposed innovative solution, using the details from the case study and the additional resources to support your findings.
153
153
- For **Milestone 5**, you will develop a presentation slide deck to summarize and deliver your final findings.
154
+
154
155
**Additional Resources:** Consider these additional resources as you complete each milestone:
155
156
- Integration feasibility report and cost analysis
156
157
- Data security assessment and encryption impact study
0 commit comments