SlideShare a Scribd company logo
1 of 4
PROBLEM MAPPING - EXAMPLE
Consumers are vulnerable
for cyber attacks and
privacy leaks
Solutions that protect
online privacy and identity
(e.g. personal VPN
solutions) are not yet
widely purchased
Consumers are
increasingly aware of
security/privacy issues,
but are not yet willing to
pay for security tech
Consumers underestimate
the risks related to
security and privacy
breaches
ProblemConsequences
Causes
Consumers have never
paid for security/privacy
protection in the past
Consumers think it is the
responsibility of the ICT
vendors to safeguard their
security and privacy
FORCEFIELD ANALYSIS - EXAMPLE
Consumers value security
and privacy more than in
the past
There is an increasing
awareness related to
security and privacy issues
amongst consumers
Consumers have never
paid for security/privacy
protection in the past
Problem
Driving forces
Restraining forces
Consumers don’t want to
pay for it
Consumers have no
experience with the
selection of security or
privacy solutions
Consumers don’t think it is
their responsibility to take
care of their security and
privacy
Consumers often think:
‘what are the chances it
will happen to me’
FORCEFIELD ANALYSIS - EXAMPLE
Consumers value security
and privacy more than in
the past
There is an increasing
awareness related to
security and privacy issues
amongst consumers
Consumers have never
paid for security/privacy
protection in the past
Problem
Driving forces
Restraining forces
Consumers don’t want to
pay for it
Consumers have no
experience with the
selection of security or
privacy solutions
Consumers don’t think it is
their responsibility to take
care of their security and
privacy
Consumers often think:
‘what are the chances it
will happen to me’
Action: Create more
awareness related to
security and privacy issues
Action: Provide more
information on the
solutions available, what
is it used for and how to
use it
Action: Offer a pricing
model which allows billing
the customers for the
security they actually used
(e.g. based on the number
of security breaches the
solution prevented)
Action: Developers of
security solutions should
cooperate with ICT
vendors to be able to offer
the consumer a complete
offer
Action: Make it mandatory
for everyone to take a
minimum level of security
measures depending on
their risk
SOURCES
Forstadt, L. A., Doore, B. (2012). Program Planning with Problem
Mapping to Better Understand Need. Tools of the Trade, February 2012,
Vol. 50, nr. 1.

More Related Content

What's hot

Advocacy planning cycle
Advocacy planning cycleAdvocacy planning cycle
Advocacy planning cycle
Zachman1
 
Introduction to sustainable develpment
Introduction to sustainable develpmentIntroduction to sustainable develpment
Introduction to sustainable develpment
jemberbelete1
 
Resource Mobilization
Resource  MobilizationResource  Mobilization
Resource Mobilization
Psdmn Phil
 

What's hot (17)

Climate smart agriculture project
Climate smart agriculture projectClimate smart agriculture project
Climate smart agriculture project
 
Community driven developement:Methods and Approaches
Community driven developement:Methods and ApproachesCommunity driven developement:Methods and Approaches
Community driven developement:Methods and Approaches
 
Advocacy planning cycle
Advocacy planning cycleAdvocacy planning cycle
Advocacy planning cycle
 
Strategic Priorities of Ethiopia's National Adaptation Plan
Strategic Priorities of Ethiopia's National Adaptation PlanStrategic Priorities of Ethiopia's National Adaptation Plan
Strategic Priorities of Ethiopia's National Adaptation Plan
 
Components of a monitoring and evaluation system
Components of a monitoring and evaluation system  Components of a monitoring and evaluation system
Components of a monitoring and evaluation system
 
Guidelines of sustainable development
Guidelines of sustainable developmentGuidelines of sustainable development
Guidelines of sustainable development
 
Systemic change presentation
Systemic change presentationSystemic change presentation
Systemic change presentation
 
Public Health Leadership
Public Health LeadershipPublic Health Leadership
Public Health Leadership
 
Introduction to sustainable develpment
Introduction to sustainable develpmentIntroduction to sustainable develpment
Introduction to sustainable develpment
 
Free and Prior Informed Consent (FPIC) in Carbon Projects
Free and Prior Informed Consent (FPIC) in Carbon ProjectsFree and Prior Informed Consent (FPIC) in Carbon Projects
Free and Prior Informed Consent (FPIC) in Carbon Projects
 
Challenges to climate finance
Challenges to climate financeChallenges to climate finance
Challenges to climate finance
 
Logical Framework Approach - LFA (LogFrame) - Project Planning
Logical Framework Approach - LFA (LogFrame) - Project PlanningLogical Framework Approach - LFA (LogFrame) - Project Planning
Logical Framework Approach - LFA (LogFrame) - Project Planning
 
Donors mapping
Donors mappingDonors mapping
Donors mapping
 
Resource Mobilization
Resource  MobilizationResource  Mobilization
Resource Mobilization
 
Ethiopia’s National Adaptation Plan (NAP-ETH) In Brief
Ethiopia’s National Adaptation Plan (NAP-ETH) In BriefEthiopia’s National Adaptation Plan (NAP-ETH) In Brief
Ethiopia’s National Adaptation Plan (NAP-ETH) In Brief
 
Sustainable Development Finance, Current Trends and Maximizing Impact
Sustainable Development Finance, Current Trends and Maximizing ImpactSustainable Development Finance, Current Trends and Maximizing Impact
Sustainable Development Finance, Current Trends and Maximizing Impact
 
How to get donor mapping right
How to get donor mapping rightHow to get donor mapping right
How to get donor mapping right
 

Viewers also liked (10)

4 why bad_things_happen_to_goog_projects
4 why bad_things_happen_to_goog_projects4 why bad_things_happen_to_goog_projects
4 why bad_things_happen_to_goog_projects
 
Exploring Reggaeton
Exploring ReggaetonExploring Reggaeton
Exploring Reggaeton
 
Jardins2010
Jardins2010Jardins2010
Jardins2010
 
Comptia All Partner Deck
Comptia All Partner DeckComptia All Partner Deck
Comptia All Partner Deck
 
Boom Sizzle Pop By: Tynesia Fields
Boom Sizzle Pop By: Tynesia FieldsBoom Sizzle Pop By: Tynesia Fields
Boom Sizzle Pop By: Tynesia Fields
 
The Maid Of The Mist Ongiaras Retold By S E
The Maid Of The Mist Ongiaras Retold By S EThe Maid Of The Mist Ongiaras Retold By S E
The Maid Of The Mist Ongiaras Retold By S E
 
Clean Up! Presentation
Clean Up! PresentationClean Up! Presentation
Clean Up! Presentation
 
Exploring Reggaeton
Exploring ReggaetonExploring Reggaeton
Exploring Reggaeton
 
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S. Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Problem mapping example

google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
Thomas Hughes
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
Alexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
Alexander Decker
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 

Similar to Problem mapping example (20)

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
DOC-20221125-WA0004..pdf
DOC-20221125-WA0004..pdfDOC-20221125-WA0004..pdf
DOC-20221125-WA0004..pdf
 
Privacy session PSUT.pptx about privacy in
Privacy session PSUT.pptx about privacy inPrivacy session PSUT.pptx about privacy in
Privacy session PSUT.pptx about privacy in
 
information security management
information security managementinformation security management
information security management
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Портфель решений TNS в области Innovation & Product Development
Портфель решений TNS в области Innovation & Product DevelopmentПортфель решений TNS в области Innovation & Product Development
Портфель решений TNS в области Innovation & Product Development
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem Space
 
The decision making process - ONLINE
The decision making process - ONLINEThe decision making process - ONLINE
The decision making process - ONLINE
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 

Recently uploaded (20)

Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 

Problem mapping example

  • 1. PROBLEM MAPPING - EXAMPLE Consumers are vulnerable for cyber attacks and privacy leaks Solutions that protect online privacy and identity (e.g. personal VPN solutions) are not yet widely purchased Consumers are increasingly aware of security/privacy issues, but are not yet willing to pay for security tech Consumers underestimate the risks related to security and privacy breaches ProblemConsequences Causes Consumers have never paid for security/privacy protection in the past Consumers think it is the responsibility of the ICT vendors to safeguard their security and privacy
  • 2. FORCEFIELD ANALYSIS - EXAMPLE Consumers value security and privacy more than in the past There is an increasing awareness related to security and privacy issues amongst consumers Consumers have never paid for security/privacy protection in the past Problem Driving forces Restraining forces Consumers don’t want to pay for it Consumers have no experience with the selection of security or privacy solutions Consumers don’t think it is their responsibility to take care of their security and privacy Consumers often think: ‘what are the chances it will happen to me’
  • 3. FORCEFIELD ANALYSIS - EXAMPLE Consumers value security and privacy more than in the past There is an increasing awareness related to security and privacy issues amongst consumers Consumers have never paid for security/privacy protection in the past Problem Driving forces Restraining forces Consumers don’t want to pay for it Consumers have no experience with the selection of security or privacy solutions Consumers don’t think it is their responsibility to take care of their security and privacy Consumers often think: ‘what are the chances it will happen to me’ Action: Create more awareness related to security and privacy issues Action: Provide more information on the solutions available, what is it used for and how to use it Action: Offer a pricing model which allows billing the customers for the security they actually used (e.g. based on the number of security breaches the solution prevented) Action: Developers of security solutions should cooperate with ICT vendors to be able to offer the consumer a complete offer Action: Make it mandatory for everyone to take a minimum level of security measures depending on their risk
  • 4. SOURCES Forstadt, L. A., Doore, B. (2012). Program Planning with Problem Mapping to Better Understand Need. Tools of the Trade, February 2012, Vol. 50, nr. 1.