Identify the potential consequences to the project client

Assignment Help Management Information Sys
Reference no: EM131174553 , Length: word count:1500

Topic - Business report providing an ethical analysis of a project management case study.

Task

Prepare a business report of about 1500 words that gives an ethical analysis of the issues raised in the case study. In particular (at least), include in the report responses to the following sub-tasks:

  • Provide a defence, on ethical grounds, for the decision to bid for the contract with a figure below the estimated costs;
  • Identify the potential consequences to the project client of accepting this aggressive bid;
  • Who else suffers or is at risk of suffering as a result of this aggressive bid being accepted?
  • What duties is the project manager aware of, 3 days before project delivery is due?
  • What duties is the test engineer aware of, 3 days before project delivery is due?
  • The ACS Code of Professional Conduct extends the meaning of the six ethical values with requirements that contribute to observing the values. Examine the code and identify requirements (using value numbers 1-6 and a requirement letter) that are relevant to this case study. Explain for each requirement identified how it should be applied in this case study.
  • Deborah and Wayne are attempting to resolve the ethical dilemma that they have. Having completed your ethical analysis provide advice as to how they should proceed, summarizing your reasons.

Attachment:- Assignment.rar

Reference no: EM131174553

Questions Cloud

What thing have you done and can you do to reduce the impact : Reflect on your own life and identify an experience that could or has disrupted/distressed your learning. What things have you done and can you do to reduce the impact of this threat in order to increase your learning?
Retrieve e-mail from a server : Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server?
What are the components of the criminal justice system : Select two theories of criminal behavior. Explain how they differ from each other. Do you think the criminal behavior theories you selected are reliable? Why or why not?
Explain the areas of the brain responsible for attention : Explain the areas of the brain responsible for attention (attentional filter) and executive functioning and address the relationship between executive functioning, attention, and the learning process.
Identify the potential consequences to the project client : ITECH7402 Professional IT Culture. Provide a defence, on ethical grounds, for the decision to bid for the contract with a figure below the estimated costs; Identify the potential consequences to the project client of accepting this aggressive bid
What kinds of technologies are being used in today courtroom : What various kinds of technologies are being used in today's courtrooms? Give examples of how they are being used.
How constitutional structure that shapes american politics : For the written assignment, you will explain how the constitutional structure that shapes American politics. Write a 3-4 page paper on the relative power of the president, Congress, and the federal judiciary.
Define current status us border patrol along mexican border : What makes the duties and responsibilities of this position one of the most important and dangerous of any law enforcement position in the country?
Write a report analyzing the most recent financial aspects : Write a report analyzing the most recent financial aspects of a publicly traded company of your choice.- Include an analysis of- liquidity, profitability, productivity, and debt management.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Provide details of how the mobile self-service

Prototyping, Write a proposal to the University including the following. The prototypes that could be created.The type of usability testing to use in determining the design that will provide the best user experience.

  How do the differences have a direct impact on employees

How are the theories you have selected different from each other? How do the differences have a direct impact on employees or managers? Is their impact stronger on the employees or the managers? Why?

  Show the impact of information for an organization

The impact of information for an organization - experience related to best practices and capability

  Opinion of cloud computing

What is your opinion of cloud computing - will it eliminate or drastically decrease the need for users to buy the real application software on CD - OR -- use the web application? If you would use cloud computing what part would you use in business..

  Question onenbsp herbert simon and allen newell explored

question onenbsp herbert simon and allen newell explored human decision making management science and artificial

  Logical data modelinglogical data modeling is one of the

logical data modelinglogical data modeling is one of the most widely used techniques to analyze and document business

  Prepare functional specifications for the company

Prepare functional specifications for the company's use of the Web and the Internet. Include links to and from other sites in your design. Prepare a list of technological specifications for implementation (i.e., what hardware and software are nece..

  What does phrase ethical behavior mean determine and

assignment explanation please respond to this question in the discussion area by wednesday at 1159 pm. the post should

  Components of the supply chaina supply chain involves all

components of the supply chaina supply chain involves all the activities associated with how raw materials facilities

  Technology in the retail environment

Technology in the Retail Environment - Write a paper describing how technology is utilized in the retail environment.

  Bugs in new maintenance releases

System crashes at certain points, so the developers will fix those bugs in new maintenance releases - Cyber-attacks can happen at any time. And unintentional errors can also expose the system to threats.

  Importance of a supply chain strategy

Describe what a supply chain is and the importance of a supply chain strategy. Identify at least four key drivers of a supply chain strategy and the important ingredient of each to a supply chain strategy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd