Freeessaysample

Enterprise IT Strategy Plan Essay

Enterprise IT Strategy Plan Essay

Enterprise IT Strategy Plan Essay

Enterprise IT Strategy Plan

Project Executive Summary

ENT/586

An executive summary that includes your chosen enterprise

As an entrepreneur, I seek to inaugurate Capital ventures, an IT enterprise which seeks to render software development services. Alongside the software development services, the company will offer repair and maintenance services of hardware including computers, laptops and tablets. The company will be located in a strategic position so as to enable easy accessibility and location by clients. With a team of about ten professional developers, the company will identify the market niches and bridge the gaps. The company will utilize the current technology and programming languages to develop revolutionary next generation applications, websites as well as other software. As a blueprint of the means by which technology will support and shape the organization’s overall business strategy, the strategic goals will consider the opinions and inputs of employees, customers and business partners. The whole idea of an IT strategy is in order to support the business idea. During the initial planning stages, business needs, goals as well as high level objectives will be formulated. An effective business strategy contains action plans as well as the growth initiatives of the business. The mission of the company is to develop next generation software applications which address the market needs. The company will seek to achieve certain objectives. The approach adopted to achieve the mission will be holistic. The core values of the company include transparency, teamwork, hard work as well as integrity. There values form part of the corporate culture and will be embedded in the ethical framework of the company.

The company and management.

The company will be run by the management composed of four executive members as well as the shareholders and other stakeholders in the company. The executives will include the chief executive officer, the deputy, chairperson of the board as well as four directors. In the team, department heads such as human resource manager, customer care manager, operation officer, financial manager as well as the project manager will be part of the larger organizing committee. The company will support the employee and empower them through provision of an enabling environment, incentives as well as promotional packages. The company acknowledges the fact that executing the strategy requires strong IT leadership. The chief information officer (CIO) as well as chief technology officer (CTO) are key to the success of the business in that they will be chiefly mandated to handle business, budget as well as legal departments. They will also be called upon to work with various user groups so as to achieve success. The company will invest heavily in IT infrastructure as it seeks to take software development to the next level. Apart from application development, the company will also offer repair and maintenance, hosting and cloud services as well as consultation services which will run on a 24/7 basis. The target audience that the company eyes include companies, educational institutions, local government, small and medium enterprises as well as firms in the hospitality and health sectors. These parties are huge users of software applications as well as hosting and cloud services. They deal with huge volumes of data and they most definitely would need the services offered by the company.

Our competitive advantages

Technology is key in creating new products and services, business models as well as enhancing customer service. To increase the sales level, the company will have to improve customer experience and boost its productivity level. Getting to select a strong industry, one which is growing, dynamic and innovation driven. Consequently, the application of idea can help transform the idea into a fortune. Ideally, this market-driven approach to entrepreneurship is ideal as opposed to the one in which one can simply create technology and attempt to find a good market and application to serve. Also, to convince investors to venture into the company will require the defending of the attractiveness of the target market with convincing data which are based on facts proving size and growth.

Enterprises are adopting new technologies. A Microsoft survey shows that about 600 British small and medium-size businesses are in search of support to work remotely and about two-thirds of them use some cloud or hosted services. However, getting to adopt new technology so as to take up opportunities is not an easy errand. Many enterprises do not have solid IT strategies and they therefore miss out on taking advantages of opportunities (Chen, Kang, Lee, & Chen, 2015). Through decision support systems, the company will conduct in-depth analysis, suggest future actions especially in the areas market niches lie. The company will develop sophisticated software which are unique from the existing software. As globalization and dynamic changes surface in the technological world, there is need to develop high class software which can solve challenges that arise. The management, shareholders and stakeholders will work collaboratively to ensure that the services rendered meet the market needs (Braganza & Lambert, 2000). Given that the company seeks to have a competitive edge, the company will have a research and development department which will get to identify the appropriate applications and software to render in the market.

Risk opportunities

It will also put into consideration of some of the internal and external factors which pose a threat to the current technology requirements and innovations. In the technology world, there is a risk of property infringement especially from application software piracy. The software developed by the company will be unique. The company will ensure that the proprietary rights and ownership. The company will ensure that the software it develops is sustainable in addition to being relevant in the market. To counter competition from other firms, the company will ensure that it constantly updates and upgrades the software (Cervone, 2006). The company will utilize a two-speed approach will involve conducting an assessment of the means by which the company will accomplish its objectives, milestones, benchmarks and the key performance indicators.

Essentially, the company has identified that software development will fill in the market gaps given that it will develop next generation application which make work easier and life enjoyable. To achieve this, IT collaboration will be paramount even as the company will continue to identify resources to advance business and technology trends that are impacting to the organization. The company will seek to be agile and in this way, it will take advantage of opportunities, create a competitive edge so as to achieve both short term and long term projections.

Financial projections

Using a balanced scorecard the company will prioritize the most immediate needs. However, the balanced scorecard strategy map will be flexible so as to accommodate organizational circumstances, market as well as industrial conditions. Moreover, the scorecard will take into account technology advances, skills and budgetary constraints. Though the initial capital will not be sufficient enough to set up all the operations, the company will plough back the profits from the dividends and use it to boost infrastructure. The capital that the company seeks to begin operations is $20million. The initial capital will be used in getting the necessary infrastructure as well as catering for the expenses associated with setting up operations. In the first quarter, the company targets a net profit after tax of about $200,000. With a varying demand and supply level, the company will take calculated risks (Kerzner & Kerzner, 2017).  For Capital ventures, the strategic plan encircles cost management, human resource management, hardware and software handling as well as risk management.

Project Technology Governance Plan

An IT governance describes the means of ascertaining the parties that make the decisions concerning the use of technology. IT governance encompasses the method which lead to the decision making regarding the technological choices. According to Ghanshala and Pant (2016), effective information technology governance includes processes by which critical IT investments decisions are made. According to Symons (2005), the IT Governance framework is typical of the Government of Saskatchewan’s methodology for the administration and oversees a great deal of IT operations. The main purpose of IT Governance framework includes:

  • The management and monitoring of large scale IT projects
  • The framework also grants the associated ministries a roadmap which is essential in proving direction especially in venture administrative practices.
  • The IT framework facilitates the composure and monitoring of IT projects.
  • Moreover, the framework enables institutions to assess the IT projects of the government and thus enables them to make informed decisions concerning IT investments.
  • The framework also presents various IT ventures and administration practices services.

IT undertakings subject to the systems’ prerequisites are those that have a base aggregate cost of $500.  An IT project with a budget of about $500 to $1.0M requires an appropriate documentation detailing the particulars of the project. The documentation should be submitted to the Information Advisory Council (IMAC) for survey purposes as well as for endorsement (Ghanshala & Pant, 2016). Errands with an aggregate cost of over $500k are subject to the Central Reporting Framework. Tiwana & Konsynski (2010) posits that services with dynamic ventures are called upon to avail that adheres the IMAC provisions.

Project ValueProject Review and Monitoring Requirements
$500 – $1MProject brief Granting IMAC top most priority (probably through the call for an IT initiative or as an in-year initiative) Regulation by a Central Reporting Framework
>$1MSubmission of business case for evaluation by IMAC (probably through the call for an IT initiative or as an in-year initiative) Legislative initiative

Expected results from the framework:

  • IT errands will be backed with an incentive for cash.
  • The management of the venture assets ought to be prudent enough.
  • The performance of the venture assets will be transparent and growth oriented.
  • The results will be time bound and cost efficient.
  • The IT venture will be scheduled to render excellent outcomes.

One of the key aims of the IT project is to attain success in implementation of resource infrastructure and business motives. The best platform to support business initiatives is through the IT project. Ideally, this can be achieved through application of effective and efficient customer service. With this regard, the framework of the project ought to be quality and of high value. It should render financial return benefits and address business issues.

It is the onus of the business leader, project coordinator and support assistant to ensure that the business arrangement attains the stipulated objectives. An evaluation of the same should be remitted showing the means by which the project is performing. The business support is key and should be gauged against benchmarks (Howlett, 2009).

Risk management

The success of the project is dependent upon the risk management techniques. There is need for assurance and mitigation of risks. As a matter of fact, risk management will in one ways entail effecting the system. In this case, there is need to take into account the merits distinguished in the business case. Hazards of the IT project are fatal. However, alternative back up plans should be formulated to ensure that they are effectively handled. The plans should be regulated to ensure that they do not violate the stipulated mission and objectives (Dahlberg & Kivijarvi, 2006).

Performance measures

Ideally, these measures assess the operations of the IT project. It places the IT venture into a weighing balance and evaluates whether it is performing as expected and whether it meets the set benchmarks set as a blueprint. The essence of performance measures is to quantify the project goals and qualify the project. Assessing the performance of the IT project is a step in the right direction.

Accountability

The merging of IT crosswise over the authorities has indeed made significant growth in the magnitude and multifaceted nature of information technology. Typically, the obligations of all gatherings as manned by specialists which might surface and be detrimental especially when they are not communicated. There is therefore need for an accountable structure which provides and assurance of solving disputes whenever they arise.

A systems acquisition plan

The enterprise will seek to employ information technology outsourcing as the preferred system design and development approach. Outsourcing is one of the popular approaches adopted by many organizations and is common in large enterprises especially those handling vast operations. Baltzan and Phillips (2015) defines information technology outsourcing as obtaining of all or part of the IT operations to an external party. Ideally, it is a subset of business process outsourcing (BPO). The most common reason for outsourcing is usually for cost reduction purposes as well as lack of IT resources by the company. There are a good number of arguments for and against IT outsourcing and these propositions are quite useful in decision making. Whether outsourcing or insourcing, procurement decisions are critical to an organizations since they impact the cashflows significantly. Notably, outsourcing information systems is affected by a variety of factors including deflation of wages, political opinion as well as high work supply. It may be quite impossible to envisage the period in which the pattern of outsourcing of IT will take be evidenced since the platform of IS outsourcing dynamically keeps on changing every moment. The key focus of outsourcing is lowering costs, reduce work costs as well as the opportunity to focus on center business forms as opposed to monotonous tedious assignments. Steps in system acquisition process

The acquisition process is more or less like the life cycle of the system in consideration. The different processes in the acquisition process include planning, analysis, design, acquisition as well as maintenance. The planning step involves the scrutinization of the underlying of any problem and goes further to ascertain possible solution that could help cure the problem. During planning, the time, cost and benefits of the project will be identified. Ideally, the company is poised to unearth the employee and stakeholders’ expectations. The second phase is the analysis and requirements stage. Ideally, the process is useful in configuring the functional requirements of the project. It the stage in which system analysis is conducted and processes such as analysis of the needs of the end user of the system with regards to the expectations are defined. Design is yet another stages in the acquisition process and in this phase, the pivotal requirements, operations as well as features of the project will be described by the end users. The technical work commences in the development phase. The network engineer and/or the database developer is engaged and tasked with the onus of managing the IT project. Major installations and project changes take place in this phase (Jiang, Perng, Sailer, Silva-Lepe, Zhou & Li, 2016). It is then that implementation follows next and in this phase, the system analyst and end users will be the direct recipients. A lot of coding for the program is written in this phase. Operations and maintenance is the last phase and is basically the phase which the end users can fine tune the system to boost the performance of the system.

The best approach would be outsourcing of the information system. Information and structural guides would be best suited to this approach. Ideally, this technique is most preferable as it drains the waste and misfortunes which would some way or another be obtained inside a firm in occasions where the system does not successfully coordinate the operations of the organizations. Ideally, this is a long term procedure and the fact that it sustains the present needs of the business as well as the future wants. The dynamic capacity theory points out the best means of achieving objectives of the project.

The need to outsource arises out of the diversification in the market. Many organizations have shifted to the use of outsourcing as a preferable means of undertaking projects. From the articles, it is true to say that outsourcing requires understanding of the business and market needs. The IT market is quite competitive and it requires an organization with a fine tuned skills to capture the demand and opportunities that arise. Apart from increased information sharing, IT outsourcing also helps in making major improvements on the systems depending on how information is utilized (Addas, S., & Pinsonneault, 2016). Moreover, IT outsourcing is the key to effective decision making. With information technology, planning, analysis, design, acquisition as well as maintenance can be achieved. The expanding rate of outsourced benefit among people has been credited to the inevitably development of mature human capacities. In the overall, information technology outsourcing generates a series of merits and boosts performance in the market place.

Project Data Collection Plan

An outline in the data collection plan of the data requirements, data collection, and management process

Every entrepreneur focuses on collecting useful data that can be used to make relevant decisions of the best business to start alongside creation of more targeted campaigns that hit the nail of the suitable audience.

Digital Data Needs

Digital data is needed to identify common behavior of the consumers so that the entrepreneur can decide on the best business to start in the market (Baltzan, 2008). Data guides on how consumers behave while online which is important in the selection of marketing channels for the new business.

Digital data improve relevancy because it guides on the themes and topics that can be used when marketing a business. This increase relevance of campaigns to the audience where the audience are communicated only what they want to hear.

Digital data increase flexibility where the entrepreneur learns the best ways to communicate to the audience. This improves the agility of the campaigns which allows an entrepreneur to collect real-time data during the campaigns.

Digital data help in the realization that not all audience is created the same because the data collected from consumers help on the realization of the needs (Sapsford & Jupp, 2006).  It assists entrepreneurs to conduct personalized campaigns with an aim to get the individual needs.

Digital data assist entrepreneurs to understand the different users behaviors, their preferences, dislikes and likes (Baltzan, 2008). The data allow association of the marketer and the consumer through online platforms.

Type of data

Identity data which includes any information that allows an individual to be uniquely identified (Hair & Lukas, 2014). This includes personal information such as names, post talk, email, date of birth, gender etc.

Quantitative data is another type that describes how customers behave or reacts to the introduced business. This data include the communication channels used by the individual, transactional information, customer service information etc.

Descriptive data which includes additional information pertaining to that customer. This can be family details, career details or even lifestyle of that customer.

Qualitative data describes the potential behavior of consumers towards the business idea (Borkar, 2012). This can be in form of attitudinal information, motivational and the opinion of the consumers towards the proposed project.

The data will be used by the management and the marketing team to identify the suitable business for the consumers. The data will also be used by academic institutions for research purposes. Vendors and stakeholders of the business can use the data to advice the entrepreneur on which business is suitable for the stated consumers (Moran, 2014).

How data management system contribute to organizational collaboration

Data management system defines the organizational collaboration because an organization that has a system connected to all departments will enhance collaboration. Any business should ensure that the data management system is connected for all departments in a way that they will work together to achieve a common goal. The choice of data management system in any business has a great contribution to how the departments will work together. The use of digital data and technology is the key to enhanced organizational collaboration.

Data collection

Data will be collected by the use of questionnaires, focus group discussions, observation and personal interviews (Sapsford & Jupp, 2006). These methods will ensure coverage of information for all consumers. Data will be stored in databases for easier access by the user. It can also be stored in computer hard disk where it can be accessed whenever needed. Emails and other online platforms like Facebook offer secure storage for the data because it has minimal likelihood to get accessed by unauthorized personnel. Cloud computing is also a safe place for data storage together with virtualization and big data.

Data analysis will include hypothesis testing, the use of mean, standard deviation as well as regression (Cervone, 2006). The use of SPSS in the analysis may also apply in this case.

Distribution of the data can be done majorly by the use of online platforms. Cloud computing, big data and virtualization will act as platforms where customer information can be stored and distributed to different users. Emails, billboards, and use of social media can also be applied in distribution of the data.

An information systems risk management plan

Risks are of many types. They could be of financial, operational, informational, technological and managerial risks and the trouble is that if not handle appropriately, these risks could be recurrent. In the Information technology world, the prevalence of risks is indeed alarming principally due the fact that IT is dynamic and ever changing.

Enterprise IT risks

Data is useful for innovation and operation. Enterprise IT risks are wide ranged. One of the risk can be brought about by compromising user actions when operating systems. Personells mandated to handle operating systems and who have access to the computers may expose information to fraudsters who instead may compromise the security levels. A perfect epitome would be rendering system access to unauthorized persons. Not only does the information becomes vulnerable but also the threat of a virus may threaten operation of the system (Ashuri, Kingsley, Rogers, Gahrooei et.al. 2015). The intruder may inject a virus, worm or Trojan into the computer and it may corrupt the operating system thereby destroying documents containing information. The fraudster may also send emails to rivals who instead may access confidential information of the organization. Moreover, the intruder may send links to sites which contain viruses which collect essential information of the organization. The social engineering on the other hand can masquerade as valid but instead entice users to undertaking actions they do not wish to engage in. A good example would be a scenario whereby a fraudsters compels appeals to employees to give them access to systems so as to install updates or conduct some security checkups; an action which might greatly compromise the computer, website as well as the portal of the organization.

Malfunctioning of the system and hardware is also another form of enterprise risk. At times, the hardware and software devices may fail to function and this may badly expose vital information to fraudsters. When an employee for example has information stored in a flash disk or any other removable device, giving out the device to an unauthorized person may greatly compromise the data stored in the device especially when the fraudster uses the information maliciously. The loss of power as well as corruption in the data may exacerbate the situation by adding onto the risks. A good number of organizations have suffered punitive losses and deteriorated their operations especially when Trojans affect their systems. The presence of viruses and worms are the number one cause of system failure (Klakegg, 2016). A system infected by viruses is affected negatively and is at risk of compromise. When viruses invade a system, they duplicate and attach themselves into the system files and at times, it becomes hard to trace them. These viruses are able to collect information remotely and send them to designated destinations. Moreover, viruses may also create unintended shortcuts which lead the user to locations which compromise data and information. Some of the web links which pop up when a user is browsing are utterly dangerous by the mere fact that they are links to hackers’ dens.

Over the recent past, cyber security threats have received much attention majorly because many organizations using IT resources improperly handled information rendering it vulnerable and easily accessible to fraudsters. A good number of organizations have hired hackers to fraud and corrupt systems of rivals. Specifically, many organizations storing their data in the cloud have had to grapple with losses after hackers corrupted the database and accessed customer information. These hackers have indefinitely shut the access to portals for some employees for a period of time so that they can conduct their operations (Cagliano, Grimaldi & Rafele, 2015). A typical scenario is the instance in which the website of an organization is temporarily shut down for maintenance. A hacker working behind the scenes may manipulate the online and offline service delivery platforms and before long, the company may go down to the drains when the system resumes operations. Natural disasters such as floods, fire, tsunamis, and cyclones may also affect operations of IT systems and introduce threats on the systems. These threats may destroy the premise where the systems are located thereby tampering with the customer records and transactions (Moran, 2014).

Assessment of the enterprise exposure to risk

It is not enough the mitigate risks and leave it at that. It is equivalently paramount to monitor and evaluate the effectiveness of the mitigation strategy so as to ensure that it is sufficient to counter new threats that arise. Risks mitigation strategies are dynamic and they keep on changing from time to time. Installing an appraisal for the strategy is paramount and it should take into account the likelihood of each risk as well as the associated cost of the issue in the event that it surfaced. An occurrence which poses a high likelihood of occurrences leading to significant losses requires a high-chance evaluation. Ideally, quantitative measures of dangers in such instances will best be handled when the organization has quality information (Cervone, 2006). However, when information is not easily accessible, it may cost the organization a great deal and given that IT-perils are quite important, it would be essential quickly develop a counter scheme to refine information collection. A possible way of doing this would probably be to embark on a subjective evaluation. In this case, the business can assess the likelihood the risk level and rank it as high, least or low. Special attention can then be levelled towards the high risk events.

Highest priority risks

Risks ranks differently according to their prevalence. Malfunctioning of the hardware and software may lead to information loss. In such instances, managers are called upon to have backup systems which can safe keep the information. Technical failures may adversely affect the access of information and an organization without a backup systems may be greatly affected. It could be that a failure in the system is out of a hacker trying to access the system. Other times, human error brought about by lack of knowledge, experience or a mistake in handling the system may lead to loss of information.

High-level procedures to mitigate and manage the most likely risks

Though there exist myriad threat-scanning operations, an organization should keep inventing new ones so as to stay up to date with the latest trends. Firewalls, antiviruses as well as encrypting techniques are just examples of some effective ways of curbing threats. Firewalls provide network security such that fraudsters are not in a position of accessing websites, emails or other sites (Team, 2014). Antiviruses on the other hand can be used online and offline to protect information on the website as well as information stored remotely in the computer.

As for backups, the organization should ensure that it has installed power and information backups so as to guarantee access to information even when power losses occur or even when damage to the system surfaces. Baltzan and Phillips (2015) postulates that it is also important that an organization puts in place an alternate work site whereby the organization can still conduct its operations even when the main locations is under threat.

High-level procedures to address business resumption and disaster recovery

It is undoubtfully true that natural disasters are punitive and when they strike, they can lead to huge losses which may cost the organization a great deal. At these instance, it is important to conduct speedy recovery options including undertaking timely and strategic actions. The organization should have a disaster management and emergency plan which assists in recovery (Dandage, Mantha, Rane & Bhoola, 2018). Ideally, the organization can undertake an insurance policy so as to cover disasters which surface from time to time. With disaster response teams in place, evacuation procedures as well as first aid errands can be conducted on a timely basis when fire, flood or earthquakes strike.

The success of the business is directly linked with the strategies that the company puts in place in mitigating risks. By properly utilizing the information technology resources in place, an organization can effectively handle operations and mitigate risks as well (Moran, 2014). Moreover, with a risk management plan, the business will be in a position to provide counter attack mechanisms and still continue with operations without compromising the security of information.

References

Addas, S., & Pinsonneault, A. (2016). IT capabilities and NPD performance: Examining the mediating role of team knowledge processes. Knowledge Management Research & Practicedoi:10.1057/kmrp.2014.16

Baltzan, P. (2008). Business-driven information systems. McGraw Hill Higher Education.

Baltzan, P., and Phillips, A. (2015). Business Driven Information Systems (5th ed).

Borkar, V. R., Carey, M. J., & Li, C. (2012). Big data platforms: what’s next?. XRDS: Crossroads, The ACM Magazine for Students19(1), 44-49.

Braganza, A., & Lambert, R. (2000). Strategic integration: developing a process-governance. Knowledge and Process Management

Cervone, H. F. (2006). Project risk management. OCLC Systems & Services: International Digital Library Perspectives, 22(4), 256-262. doi:10.1108/10650750610706970

Chen, H. H., Kang, H., Amy H I Lee, & Chen, S. (2015). Strategies, decisions and operations for keeping exploitative and exploratory activities balanced. Knowledge Management Research & Practice doi:10.1057/kmrp.2013.42

Dahlberg, T., & Kivijarvi, H. (2006). An integrated framework for IT governance and the development and validation of an assessment instrument. In System Sciences, 2006. HICSS’06. Proceedings of the 39th Annual Hawaii International Conference.

Ghanshala, K. K., & Pant, D. (2016). M- Governance model to accentuate governance framework in governance architecture to empower people in Himalayan villages using mobile technology. International Journal of Advanced Research in Computer Science, 7(4)

Hair Jr, J. F., & Lukas, B. (2014). Marketing research (Vol. 2). McGraw-Hill Education Australia.

Howlett, M. (2009). Governance modes, policy regimes and operational plans: A multi-level nested model of policy instrument choice and policy design. Policy Sciences, 42(1), 73-89. doi:10.1007/s11077-009-9079-1

Jiang, Y., Perng, C., Sailer, A., Silva-Lepe, I., Zhou, Y., & Li, T. (2016). CSM: A cloud service marketplace for complex service acquisition. ACM Transactions on Intelligent Systems and Technology (TIST), 8(1), 1-25. doi:10.1145/2894759

Kerzner, H., & Kerzner, H. R. (2017). Project management: a systems approach to planning, scheduling, and controlling. John Wiley & Sons.

Moran, A. (2014). Project Risk Management. In Agile Risk Management (pp. 17-32). Springer, Cham.

Sapsford, R., & Jupp, V. (Eds.). (2006). Data collection and analysis. Sage.

Symons, C. (2005). IT governance framework. Forrester Research.

Tiwana, A., & Konsynski, B. (2010). Complementarities between organizational IT architecture and governance structure. Information Systems Research, 21(2), 288-304. doi:10.1287/isre.1080.0206

Browse more products here

Order Here

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.