Securing Higher Grades Costing Your Pocket? Book Your Coursework Help at The Lowest Price Now!

  • +1-617-874-1011 (US)
  • +44-117-230-1145 (UK)
Online Customer Service

MGT670-International Human Resource Studies

  70 Download     📄   4 Pages / 828 Words

Using the identified risk as the basis for your assignment, complete the following requirements.

Part 1

Write a 500-word summary that addresses the following:

Explain the regulatory compliance and security controls that should be adhered to in order to address the risk.
Explain why adherence to regulatory compliance measures and security controls is essential from the customer perspective and the business perspective. Provide specific examples to illustrate your ideas.

Part 2

Create a data flow diagram to illustrate how systems will interact with the customer and how the data are passed through the system(s), including how the data will reside in the system of record. Explain the data flow diagram in regard to the key controls in place to address protection of personal identifiable information (PPII).

Part 3

Complete the "Security Controls Mapping Template" using the FMEA from the Topic 4 assignment. Reference appropriate regulatory compliance information (i.e., HIPAA, PCI, SOX) and security control frameworks (i.e., NIST, CIS, COBIT) when completing the template.

General Requirements

Submit the summary, data flow diagram, and "Security Controls Mapping Template" documents.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.


Part 1

The risk sector which is taken into consideration in the aspect is the security of the data and the customer identify theft.

In order to analysis the risk management there are basically few processes which should be incorporated. The processes are stated below:

  • Basic process: 1. Identify the risk
  1. Analyze the risk
  2. Plan
  3. Execute
  4. Control.
  • Tools: PFMEA ( process failure mode effect analysis) or others
  • Communication channel which would be supporting the risk management (Lolli te la., 2015.

Generally it can be stated that the risk represents the factor which is related to the occurrence and of any undesired event which directly triggers the different types of failure. The aspect of risk analysis can be stated to be used to directly find out the failure and to prevent these types of failure from occurring in the future. There are different types of fault analysis which can be include the sector of Fault tree analysis (FTA) which can be stated as a top down method which can be used for the purpose of relationship identification between different events of failure such as the customer identify theft. The extension of the FMEA can be FMECA (Failure mode, effects and critical analysis) which is achieved from the adding of the criticality of the analysis. The main advantage which can be achieved from the concept is that the purely qualitative FMEA can be converted into quantitative.

The regulatory compliance and the security control that should be adhered as are following.

  • The failure identification should be done deductively
  • Allow the potential failure of the process to be seen in a detailed manner.
  • It should directly represent the behavior of the process
  • It should directly enable the qualitative or quantitative analysis of the process which are involved into the process.
  • The methods which are related to the identification of the parts of the process which are related to the risk and can extract the concept of specific failure.

The aspect of adherence to the regulatory compliance measures and the security control is essential due to the factor that no third party can indulge into any type of operation. In most of the cases it can be stated that the data of the user or the customer can be considered one of the most important assists which if accessed by any third party it can a big loss from the point of view of the customer as well as the business prospective.

Example 1: The data of the user should be kept secured so that to prevent unauthorized user from getting access to the data.

Example 2: The organization to tend to task advantage of the concept should use the basic framework which is related to the risk identification and the factors of the mitigation of the risk factors (Vahdani, Salimi & Charkhchian, 2015).

Part 2 - DFD

Figure 1: DFD Diagram

(Source: BY AUTHOR)

Part 3: Security Controls Mapping Template


Lolli, F., Ishizaka, A., Gamberini, R., Rimini, B., & Messori, M. (2015). FlowSort-GDSS–A novel group multi-criteria decision support system for sorting problems with application to FMEA. Expert Systems with Applications, 42(17-18), 6342-6349.

Mandal, S., & Maiti, J. (2014). Risk analysis using FMEA: Fuzzy similarity value and possibility theory based approach. Expert Systems with Applications, 41(7), 3527-3537.

Schmittner, C., Gruber, T., Puschner, P., & Schoitsch, E. (2014, September). Security application of failure mode and effect analysis (FMEA). In International Conference on Computer Safety, Reliability, and Security (pp. 310-325). Springer, Cham.

Vahdani, B., Salimi, M., & Charkhchian, M. (2015). A new FMEA method by integrating fuzzy belief structure and TOPSIS to improve risk evaluation process. The International Journal of Advanced Manufacturing Technology, 77(1-4), 357-368.

This problem has been solved.

Please send an Email to with the Payment ID and the link to the document to collect by email

Cite This work.

To export a reference to this article please select a referencing stye below.

Urgent Homework (2022) . Retrive from

"." Urgent Homework ,2022,

Urgent Homework (2022) . Available from:

[Accessed 29/09/2022].

Urgent Homework . ''(Urgent Homework ,2022) accessed 29/09/2022.

Buy MGT670-International Human Resource Studies Answers Online

Talk to our expert to get the help with MGT670-International Human Resource Studies Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for MGT670-International Human Resource Studies Assignment Help Online


    • 24 x 7 Availability.
    • Trained and Certified Experts.
    • Deadline Guaranteed.
    • Plagiarism Free.
    • Privacy Guaranteed.
    • Free download.
    • Online help for all project.
    • Homework Help Services

Tap to Chat
Get Instant Assignment Help
Tap to Chat
Get Instant Assignment Help