Disclaimer: This is an example of a student written assignment.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

Case Analysis on Organisational Readiness for Change

Paper Type: Free Assignment Study Level: University / Undergraduate
Wordcount: 1777 words Published: 10th Jun 2020

Reference this

INTRODUCTION

This case study is about the analysis of organisation readiness for implementing a change. It basically introduces to the concept of how effective skills are needed for change management which could be seen through the evaluation of Kotter’s change model. As company its data breach so this would make us further understood how does breach of data can affect organisation.

Critical success factors

Critical success factors of any company are depends on its customers. If customers are satisfied then company can easily achieve success in a short span of time. As in this case study the success factor of Flayton electronics is depends on good quality of products and relationship with buyers. Customer’s data was breached and company did not know about it in the beginning but was then trying to tell this to customers. The company earlier did not knew about the theft of data and they did not knew how to overcome that so the factor by which the theft can be reduced or can be completely stopped is by training the employees or hiring the third party who can design the firewall for the company which can protect the outer world entering the systems and ask the designers to give a tutorial to employees by which they can secure their data’s. In the case study it is shown that only a limited security defense is available at the flayton electronics and in the company it is also shown that there was regular scan was to be done by external auditors but it did not happen, the actual authority was with the company for daily scan but they did not scan their systems and protect the data from theft. The success factor for this should be monitoring and the staff working in the company should scan their system on daily basis so that they can save their data from theft and if they find any intruders in the systems and they can share this information with other staff and acknowledge them about defense issues. However as shown in case study Brett have been expanding companies business at a very large level but they have failed to secure their data systems so they need to defend their data systems by making investments in the security infrastructures and by this they can secure their data more accurately and employee training should be done so that they can defend their data and files on daily basis. Another thing is that company should keep their systems updated and make the software’s more effective so that the employees can keep the data secure and keep it secure from the intruders and if we talk about the case in the study that one of the fire wall was disabled by which the system was crashing every time and by this the intruders were able to gain access in the system and steal the companies data and files. So if the company had been scanning the systems on daily basis they can know that one firewall was disabled and they could have fixed it.

Kotter’s eight steps of change

  1. Create a sense of urgency
  2. Form a guiding coalition
  3. Create a vision
  4. Communicate a vision
  5. Empower others to act on vision
  6. Create quick wins
  7. Build the change
  8. Institutionalize the change

KOTTER’S MODEL OF CHANGE

Considering the data breach in the organization, it is very important and urgent to implement the change. As in this case, Flayton Electronics got its data breached and now is in need of implementing change in terms of proper risk management software and proper connection with banks for the information. In view to this, Kotter’s model of change is very effective model which can help to improve the ability of change for an organization and to increase the chances of success. Creating a sense of urgency – flayton electronics need to make some urgency to eradicate the risk of data breach system like Brett can meeting with their staff members in which he will communicate about the consequences  of data breach system and customer are not happy with the service of the organization and try to make the staff understand the need of creating a sense of urgency. Guiding coalitiation- Brett will divide the tasks for this change process to their team members to actually get on right track and friedman will focus on the human resource department because he is the head of the department and sally will consider about the communication process because she know how to communicate with the other stakeholders about the current situation. Create a vision- proper strategy has to be created to realize this vision for change and create efforts for the same. Communicate a vision­- Flayton Electronics in such view would then need to communicate properly about the change and valid reasons so that any concern and opinion if possible could be taken from the employees. Communicating about the change creates obstacles that need to be properly handled. It could be done by Flayton Electronics only by implementing the opinion of people in change process. Empower others to act on vision-It could be done by Flayton Electronics only by implementing the opinion of people in change process. The updation of plans needs to be done for short term in the beginning so that it motivates them to work for change and also it would strengthen the systems as well as the firewall. Motivating and rewarding the employees could help in meeting short term goals before time. Create quick wins-Motivating and rewarding the employees could help in meeting short term goals before time. Build the change -Creating this short term goal would meet the change implementation and continuous progress could be sustained towards the success. Creating this short term goal would meet the change implementation and continuous progress could be sustained towards the success. Institutionalize the change -The anchoring of the change would thus ensure about meeting the requirement of firewall (Kotter’s 8 Step Change Model, 2019).

ORGANISATIONAL READINESS

Organizational readiness basically tells about the relationship that people, systems, performance measurement and processes possess. It is only possible if there is proper coordination among each other. Organizational readiness for change is multi-level process that requires proper synchronization between various stages. As organization and company perspective it relates to that all members share the resolves to successfully implement a change. Employee’s agreement to bring out change is very necessary for any organization. Employees need to be motivated towards new changes. As company in the risk and is facing multiple issues to bring out solution into this company .It needs to have proper cyber security for the same which would help in proper maintaining data for credit cards and other data that are important for it. The most important part are employees they need to realize the necessity of the organisation. By installing proper risk management software it could help itself in managing project risk by not updating its data at various sites (Bryan J WeinerEmail author, 2009) There are basically three determinants of capability for implementing the change. They are:
  • Demand for task
  • Availability of resources
  • Situation at a point of time

RECOMMENDATIONS FOR PROJECT RISK

On the basis of the analysis of the case some of the recommendations that could be given for project risk are as follows:- The Company in order to minimize the risk associated should focus on using high classified software and encrypted codes that would help in limiting the ability to hack by any outsider in company’s data system through any software. Online safety and security risk can also lead to some legal issues for e-business and any breach in system would thus even increase the insurance risk for company (Osmond Vitez, 2017). So as in the case study the leak of data has been stated so after is has been done the company should get in contact with the victims means the clients whose data has been leaked and by this company can overcome the risk of fraudulent and by doing this they will not lose customers and know that who’s the mole and provide with best resources which will be needed by the company in future to protect the theft of data.    (Wes Gillette, 2015). It also can happen the employees may not agree with upcoming changes so they can stand against the new technology because they might not have skills to use that system. So employees need to get train for new software.

INFERENCE 

After the case analysis, it could be understood how does change impacts the organisation and what Kotter’s 8 steps are of change model that shows how can change be implemented in organisation. As this company has faced problem of data breach so now in order to reduce the risk associated few changes need to be implemented which has been discussed in the above analysis.

REFERENCES

  • How SAP helps to Maximize Business Performance. (2013, 06 11). Retrieved 06 03, 2019, from www.disys.com: https://www.disys.com/news/how-sap-helps-to-maximize-business-performance/
  • Kotter’s 8 Step Change Model. (2019). Retrieved 06 03, 2019, from www.toolshero.com: https://www.toolshero.com/change-management/8-step-change-model-kotter/
  • Bryan J WeinerEmail author. (2009, 10 19). A theory of organizational readiness for change. Implementation Science.
  • Osmond Vitez. (2017, 09 26). Retrieved 06 04, 2019, from www.bizfluent.com: https://bizfluent.com/list-6188289-e-business-risks.html
  • Wes Gillette. (2015, 08 12). Guidelines for Project Risk Managemen. Retrieved 06 04, 2019, from www.safran.com: https://www.safran.com/blog/top-5-guidelines-for-project-risk-management
  • Wes Gillette. (2015, 08 12). Top 5 Guidelines for Project Risk Management. Retrieved 06 04, 2019, from www.safran.com: https://www.safran.com/blog/top-5-guidelines-for-project-risk-management

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this assignment and no longer wish to have your work published on UKEssays.com then please: