PSY-6513 v1: Threat Management : Assignment – Design a Case Management Flowchart

Background

For this assignment, take the case that you used in Lessons 5 and 6 to create a management flowchart of the case.  You will find that the Microsoft Word application has different shapes and connectors that you might use for this assignment. 

Instructions

You can access these Word elements by going to Insert, then Shapes, and pick the shapes you want, fill them with the appropriate text, and then connect them with connectors showing the direction of flow.  To line things up, it might be helpful to consider starting with a blank page and having grid lines on that page as you work with your shapes and connectors, removing the grid lines when you are finished. 

Remember to choose visual components that would allow a person unfamiliar with the case to quickly identify the key elements and understand what you are envisioning is the way the case should be managed.  Also, remember that enough information must be present in the various boxes for someone to make sense of what is happening in the case and why certain choices have been made. 

This flowchart should start with some information about the essential concerning behaviors in the case that were exhibited a week prior to the case culminating in the events that led to its publication.  From there the flow would need to include each party that could be interviewed as a part of the management process should be listed, what types of security steps should be considered and in what order; any law enforcement contacts that should be considered, if those would be appropriate, and any other management steps that should be considered, showing what order you believe would make them primary (i.e., earlier in the flowchart) and secondary (i.e., for later consideration in the flow of events). 

Also include case monitoring where and when appropriate, as well as follow-up communications and to whom, if and when those communications would be appropriate/necessary. 

Length:  1-2 pages

Once you have completed the flow chart, print it out as a PDF document and upload your document by clicking the Submit to Dropbox button.

Your presentation should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic.  Be sure to adhere to Northcentral University’s Academic Integrity Policy. 

 Learning Outcomes:

  • Explore the various threat management tools, focusing on implementation and operational considerations. (5) 
  • Demonstrate an understanding of threat management strategy development and practical implementation. (3) 

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.