SlideShare a Scribd company logo
1 of 4
PROBLEM MAPPING - EXAMPLE
Consumers are vulnerable
for cyber attacks and
privacy leaks
Solutions that protect
online privacy and identity
(e.g. personal VPN
solutions) are not yet
widely purchased
Consumers are
increasingly aware of
security/privacy issues,
but are not yet willing to
pay for security tech
Consumers underestimate
the risks related to
security and privacy
breaches
ProblemConsequences
Causes
Consumers have never
paid for security/privacy
protection in the past
Consumers think it is the
responsibility of the ICT
vendors to safeguard their
security and privacy
FORCEFIELD ANALYSIS - EXAMPLE
Consumers value security
and privacy more than in
the past
There is an increasing
awareness related to
security and privacy issues
amongst consumers
Consumers have never
paid for security/privacy
protection in the past
Problem
Driving forces
Restraining forces
Consumers don’t want to
pay for it
Consumers have no
experience with the
selection of security or
privacy solutions
Consumers don’t think it is
their responsibility to take
care of their security and
privacy
Consumers often think:
‘what are the chances it
will happen to me’
FORCEFIELD ANALYSIS - EXAMPLE
Consumers value security
and privacy more than in
the past
There is an increasing
awareness related to
security and privacy issues
amongst consumers
Consumers have never
paid for security/privacy
protection in the past
Problem
Driving forces
Restraining forces
Consumers don’t want to
pay for it
Consumers have no
experience with the
selection of security or
privacy solutions
Consumers don’t think it is
their responsibility to take
care of their security and
privacy
Consumers often think:
‘what are the chances it
will happen to me’
Action: Create more
awareness related to
security and privacy issues
Action: Provide more
information on the
solutions available, what
is it used for and how to
use it
Action: Offer a pricing
model which allows billing
the customers for the
security they actually used
(e.g. based on the number
of security breaches the
solution prevented)
Action: Developers of
security solutions should
cooperate with ICT
vendors to be able to offer
the consumer a complete
offer
Action: Make it mandatory
for everyone to take a
minimum level of security
measures depending on
their risk
SOURCES
Forstadt, L. A., Doore, B. (2012). Program Planning with Problem
Mapping to Better Understand Need. Tools of the Trade, February 2012,
Vol. 50, nr. 1.

More Related Content

What's hot

Hr policy tata aig
Hr policy tata aigHr policy tata aig
Hr policy tata aigVivek Shukla
 
Strategic Human Resource Management
Strategic Human Resource ManagementStrategic Human Resource Management
Strategic Human Resource ManagementElijah Ezendu
 
Hr Competencies Presentation
Hr Competencies PresentationHr Competencies Presentation
Hr Competencies PresentationGeoff Verschoor
 
Top 10 proposals engineer interview questions and answers
Top 10 proposals engineer interview questions and answersTop 10 proposals engineer interview questions and answers
Top 10 proposals engineer interview questions and answershudsonbilly94
 
Research work on Green Human Resource practices & Organization's Performance.
Research work on Green Human Resource practices & Organization's Performance.Research work on Green Human Resource practices & Organization's Performance.
Research work on Green Human Resource practices & Organization's Performance.Ana Sheikh
 
Online Recruitment
Online RecruitmentOnline Recruitment
Online Recruitmentsaumarjyoti
 

What's hot (6)

Hr policy tata aig
Hr policy tata aigHr policy tata aig
Hr policy tata aig
 
Strategic Human Resource Management
Strategic Human Resource ManagementStrategic Human Resource Management
Strategic Human Resource Management
 
Hr Competencies Presentation
Hr Competencies PresentationHr Competencies Presentation
Hr Competencies Presentation
 
Top 10 proposals engineer interview questions and answers
Top 10 proposals engineer interview questions and answersTop 10 proposals engineer interview questions and answers
Top 10 proposals engineer interview questions and answers
 
Research work on Green Human Resource practices & Organization's Performance.
Research work on Green Human Resource practices & Organization's Performance.Research work on Green Human Resource practices & Organization's Performance.
Research work on Green Human Resource practices & Organization's Performance.
 
Online Recruitment
Online RecruitmentOnline Recruitment
Online Recruitment
 

Viewers also liked

4 why bad_things_happen_to_goog_projects
4 why bad_things_happen_to_goog_projects4 why bad_things_happen_to_goog_projects
4 why bad_things_happen_to_goog_projectsRobert Nuñez
 
Jardins2010
Jardins2010Jardins2010
Jardins2010Seb Lh
 
Comptia All Partner Deck
Comptia All Partner DeckComptia All Partner Deck
Comptia All Partner DeckLevel Platforms
 
Boom Sizzle Pop By: Tynesia Fields
Boom Sizzle Pop By: Tynesia FieldsBoom Sizzle Pop By: Tynesia Fields
Boom Sizzle Pop By: Tynesia FieldsRachel Fontus
 
The Maid Of The Mist Ongiaras Retold By S E
The Maid Of The Mist Ongiaras Retold By S EThe Maid Of The Mist Ongiaras Retold By S E
The Maid Of The Mist Ongiaras Retold By S ERachel Fontus
 
Clean Up! Presentation
Clean Up! PresentationClean Up! Presentation
Clean Up! PresentationAmsontan
 
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S. Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S. Rachel Fontus
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Viewers also liked (10)

4 why bad_things_happen_to_goog_projects
4 why bad_things_happen_to_goog_projects4 why bad_things_happen_to_goog_projects
4 why bad_things_happen_to_goog_projects
 
Exploring Reggaeton
Exploring ReggaetonExploring Reggaeton
Exploring Reggaeton
 
Jardins2010
Jardins2010Jardins2010
Jardins2010
 
Comptia All Partner Deck
Comptia All Partner DeckComptia All Partner Deck
Comptia All Partner Deck
 
Boom Sizzle Pop By: Tynesia Fields
Boom Sizzle Pop By: Tynesia FieldsBoom Sizzle Pop By: Tynesia Fields
Boom Sizzle Pop By: Tynesia Fields
 
The Maid Of The Mist Ongiaras Retold By S E
The Maid Of The Mist Ongiaras Retold By S EThe Maid Of The Mist Ongiaras Retold By S E
The Maid Of The Mist Ongiaras Retold By S E
 
Clean Up! Presentation
Clean Up! PresentationClean Up! Presentation
Clean Up! Presentation
 
Exploring Reggaeton
Exploring ReggaetonExploring Reggaeton
Exploring Reggaeton
 
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S. Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
Wolstencroft the Bear by Karen Lewis - Illustrated by Michael S.
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Problem mapping example

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Ann Wuyts
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian_US
 
Privacy session PSUT.pptx about privacy in
Privacy session PSUT.pptx about privacy inPrivacy session PSUT.pptx about privacy in
Privacy session PSUT.pptx about privacy inzayadeen2003
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-usersThomas Hughes
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Dana Gardner
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yetLaura Bell
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK
 
Портфель решений TNS в области Innovation & Product Development
Портфель решений TNS в области Innovation & Product DevelopmentПортфель решений TNS в области Innovation & Product Development
Портфель решений TNS в области Innovation & Product DevelopmentИнга Кныш
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceJack Whitsitt
 
The decision making process - ONLINE
The decision making process - ONLINEThe decision making process - ONLINE
The decision making process - ONLINEmaxineellison
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Huntsman Security
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 

Similar to Problem mapping example (20)

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
 
Experian Cybersecurity Survey
Experian Cybersecurity Survey Experian Cybersecurity Survey
Experian Cybersecurity Survey
 
DOC-20221125-WA0004..pdf
DOC-20221125-WA0004..pdfDOC-20221125-WA0004..pdf
DOC-20221125-WA0004..pdf
 
Privacy session PSUT.pptx about privacy in
Privacy session PSUT.pptx about privacy inPrivacy session PSUT.pptx about privacy in
Privacy session PSUT.pptx about privacy in
 
information security management
information security managementinformation security management
information security management
 
google-experts-VS-regular-users
google-experts-VS-regular-usersgoogle-experts-VS-regular-users
google-experts-VS-regular-users
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Портфель решений TNS в области Innovation & Product Development
Портфель решений TNS в области Innovation & Product DevelopmentПортфель решений TNS в области Innovation & Product Development
Портфель решений TNS в области Innovation & Product Development
 
Yours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem SpaceYours Anecdotally: Developing a Cybersecurity Problem Space
Yours Anecdotally: Developing a Cybersecurity Problem Space
 
The decision making process - ONLINE
The decision making process - ONLINEThe decision making process - ONLINE
The decision making process - ONLINE
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 

Recently uploaded

A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 

Recently uploaded (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 

Problem mapping example

  • 1. PROBLEM MAPPING - EXAMPLE Consumers are vulnerable for cyber attacks and privacy leaks Solutions that protect online privacy and identity (e.g. personal VPN solutions) are not yet widely purchased Consumers are increasingly aware of security/privacy issues, but are not yet willing to pay for security tech Consumers underestimate the risks related to security and privacy breaches ProblemConsequences Causes Consumers have never paid for security/privacy protection in the past Consumers think it is the responsibility of the ICT vendors to safeguard their security and privacy
  • 2. FORCEFIELD ANALYSIS - EXAMPLE Consumers value security and privacy more than in the past There is an increasing awareness related to security and privacy issues amongst consumers Consumers have never paid for security/privacy protection in the past Problem Driving forces Restraining forces Consumers don’t want to pay for it Consumers have no experience with the selection of security or privacy solutions Consumers don’t think it is their responsibility to take care of their security and privacy Consumers often think: ‘what are the chances it will happen to me’
  • 3. FORCEFIELD ANALYSIS - EXAMPLE Consumers value security and privacy more than in the past There is an increasing awareness related to security and privacy issues amongst consumers Consumers have never paid for security/privacy protection in the past Problem Driving forces Restraining forces Consumers don’t want to pay for it Consumers have no experience with the selection of security or privacy solutions Consumers don’t think it is their responsibility to take care of their security and privacy Consumers often think: ‘what are the chances it will happen to me’ Action: Create more awareness related to security and privacy issues Action: Provide more information on the solutions available, what is it used for and how to use it Action: Offer a pricing model which allows billing the customers for the security they actually used (e.g. based on the number of security breaches the solution prevented) Action: Developers of security solutions should cooperate with ICT vendors to be able to offer the consumer a complete offer Action: Make it mandatory for everyone to take a minimum level of security measures depending on their risk
  • 4. SOURCES Forstadt, L. A., Doore, B. (2012). Program Planning with Problem Mapping to Better Understand Need. Tools of the Trade, February 2012, Vol. 50, nr. 1.