Identify the potential consequences to the project client

Assignment Help Management Information Sys
Reference no: EM131174553 , Length: word count:1500

Topic - Business report providing an ethical analysis of a project management case study.

Task

Prepare a business report of about 1500 words that gives an ethical analysis of the issues raised in the case study. In particular (at least), include in the report responses to the following sub-tasks:

  • Provide a defence, on ethical grounds, for the decision to bid for the contract with a figure below the estimated costs;
  • Identify the potential consequences to the project client of accepting this aggressive bid;
  • Who else suffers or is at risk of suffering as a result of this aggressive bid being accepted?
  • What duties is the project manager aware of, 3 days before project delivery is due?
  • What duties is the test engineer aware of, 3 days before project delivery is due?
  • The ACS Code of Professional Conduct extends the meaning of the six ethical values with requirements that contribute to observing the values. Examine the code and identify requirements (using value numbers 1-6 and a requirement letter) that are relevant to this case study. Explain for each requirement identified how it should be applied in this case study.
  • Deborah and Wayne are attempting to resolve the ethical dilemma that they have. Having completed your ethical analysis provide advice as to how they should proceed, summarizing your reasons.

Attachment:- Assignment.rar

Reference no: EM131174553

Questions Cloud

What thing have you done and can you do to reduce the impact : Reflect on your own life and identify an experience that could or has disrupted/distressed your learning. What things have you done and can you do to reduce the impact of this threat in order to increase your learning?
Retrieve e-mail from a server : Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server?
What are the components of the criminal justice system : Select two theories of criminal behavior. Explain how they differ from each other. Do you think the criminal behavior theories you selected are reliable? Why or why not?
Explain the areas of the brain responsible for attention : Explain the areas of the brain responsible for attention (attentional filter) and executive functioning and address the relationship between executive functioning, attention, and the learning process.
Identify the potential consequences to the project client : ITECH7402 Professional IT Culture. Provide a defence, on ethical grounds, for the decision to bid for the contract with a figure below the estimated costs; Identify the potential consequences to the project client of accepting this aggressive bid
What kinds of technologies are being used in today courtroom : What various kinds of technologies are being used in today's courtrooms? Give examples of how they are being used.
How constitutional structure that shapes american politics : For the written assignment, you will explain how the constitutional structure that shapes American politics. Write a 3-4 page paper on the relative power of the president, Congress, and the federal judiciary.
Define current status us border patrol along mexican border : What makes the duties and responsibilities of this position one of the most important and dangerous of any law enforcement position in the country?
Write a report analyzing the most recent financial aspects : Write a report analyzing the most recent financial aspects of a publicly traded company of your choice.- Include an analysis of- liquidity, profitability, productivity, and debt management.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information security is an expensive and difficult

Draw the line on what is sufficient and what steps do you take to determine where that line is? Explain

  For a one-to-many relationship between tables of project

For a one-to-many relationship between tables of Project and Employee, if the minimal cardinality is as following situations, discuss the way to ensure the data integrity when data is inserted, modified and deleted. (Note, you may draw a table to ill..

  The solution to time seriesthe u credit union is open

the solution to time seriesthe u credit union is open monday through saturday. the winters method is being used a b y

  Many organizational considerations

Of the many organizational considerations that a project plan must address, choose three that you think are the most important and explain why. What might happen if any of them were eliminated from the project planning process?

  Hot technologiesvisit a web site of an information

hot technologiesvisit a web site of an information systems-related content provider such as informationweek

  Foundations and current challenges in strategic

foundations and current challenges in strategic managementin a narrative format discuss these firms from a strategic

  Hwo much would you pay for maddy computer company using the

hwo much would you pay for maddy computer company using the earnings multiplies model?you have been reading about maddy

  Non-it managers inputs on technologyshould non-it managers

non-it managers inputs on technologyshould non-it managers identify technology that will help the business meets its

  Define business processes and activities

How can information technology support a company's business processes and decision making and give it a competitive advantage? Give examples to illustrate your answer.

  Describe the roles of a drp or ecp team

Describe the outside expert's qualifications for what you are outsourcing. Evaluate one best method for developing a DRP/ECP awareness campaign. Evaluate one best method for implementing a DRP/ECP awareness campaign.

  Describe threats that specifically target confidentiality

Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.7. What are the components of two-factor authentication ? Provide exa..

  What are three innovative technologies that can be used

What are three innovative technologies that can be used to address the needs of the organization? How do the technologies address the need

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd