To identify areas of risk related to technology and


To identify areas of risk related to technology and technology use, including business, financial, technical, reputation and other risks. Once the areas of risk have been identified, the students will rank the risks and propose how each of the risks should be mitigated.

Back Story

Five people - Susie, Guillermo, Kyoko, Willy and you have decided to esta startup that will design-build-operate a new cloud-based service to help senior citizens to find appropriate living arrangements with the necessary amenities to enjoy life and health services to meet their changing requirements as they continue to age over time. This silver care startup is planning to launch using the individual team members' personal laptops and mobile phones. They are going to save their work in a shared workspace online - using GoogleDrive / GoogleDocs for the various documents that are being jointly drafted and edited - and then moving finalized materials to DropBox for password-protected folders that can be shared with 3rd parties outside their company. Of course, as they launch and scale-up, they must consider how to set-up and operate the right hardware, software, security and so on. You're the one they're going to rely on to figure it out.

International Opportunities Pop-up

One of the founders' friends is from Russia. It turns out that there are a lot of elderly people there, too, who would like to have a service to help them arrange suitable accommodations for quality of life and healthcare combined. Another of the founders' friends is from Mainland China - and they also are interested in this kind of solution for their rapidly aging society. Russia and China are certainly promising markets for the type of solutions your group is developing. But they are also places known for professional grade hackers - people who are hired to hack systems around the world, not just pranksters working from home to cause trouble.

Technology Management Problems

You're one of the startup's five founders. Your partners have asked you to create a bullet proof technology management plan that will allow the fledgling company to (a) launch & scale-up in the USA; (b) diversify the base product and localize it for both Russia and China; while (c) assuring that the data assets, technology development process, and intellectual property that is created can be protected against potential and actual harm - - - including potential diversion from insiders to the Russians and Chinese; or external hackers fighting their way into your company's network and database to scoop up as much as they can without being caught.

Solution Preview :

Prepared by a verified Expert
Business Management: To identify areas of risk related to technology and
Reference No:- TGS02538224

Now Priced at $10 (50% Discount)

Recommended (92%)

Rated (4.4/5)