Strategic IT Plan

  

Strategic IT Planning: Your 3-Step Process

Introduction

Strategic IT Planning is required to ensure your resources and assets continue providing the results and the support your organization needs.

What is a Strategic Plan?

It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.

Making it Happen

There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Don’t bite off too much or try to be too ambitious.

• Take your time and keep it manageable

• Link your plan to your company’s strategy

• Justify your initiative and get buy-in and support

• Don’t re-invent, rebuild

• Go slow, manage change

• Set aside time from your operational responsibilities to make it happen

Without a Strategic Plan, you and your team won’t be effective and you won’t be able to get results, get attention and get ahead.

Why you need an IT Strategy:

Redirect from tasks to opportunities and result

• Switch from fighting fires to preventing fires

• Reduce risk with planning and a longer view

Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:

1. Why do you need to do it? What is your goal?

2. What are the things you need to get done to achieve your goal?

3.  How can you make those things happen?

By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.

Implementation Plan

Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.

1. Set the objective for each step

2. Analyze internal/external factors

3. Develop solutions

4. Identify and eliminate barriers

5. Allocate resources (people, time, money)

6. Develop detailed tasks

7. Implement your plan!

Step Implementation

What Are The Roadblocks?

How Can You Overcome The Roadblocks?

What Resources Do You Need?

What Are The Timelines?

What Are The Main Steps To Implement Your Plan?

One Page outline of a Term Paper on are there any loopholes in the IT ACT 2000?

 Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts, and reading 

Use the information below to help with the outline for the term paper

 Are there any loopholes in the IT ACT 2000?

Yes, there are many weaknesses and loopholes revolving around Information Technology Act, 2000 even after the 2008 amendments. They are as follows:

  1. ITA 2000 does not deal with Proper Intellectual Property Protection for Electronic Information and Data. Contentious yet very important issues concerning online copyrights, trademarks, and patents have been left unnoticed by the law, thereby leaving many loopholes.
  2. It does not pay any heed to Domain Name related issues. It does not deal with the rights and liabilities of domain name holders.
  3. It does not cover various evolving forms and manifestations of cybercrimes such as:
  • Cyber theft;
  • Cyberstalking;
  • Cyber harassment;
  • Cyber defamation;
  • Cyber fraud;
  • Chat room abuses;
  • Misuse of credit card numbers.

4. It does not touch upon antitrust issues.

5. It is not explicit about the regulations of electronic payments.

And the biggest flaw is the improper implementation of the cyber laws as the police stations are not well equipped with the required technology and technical skills associated with them.

Assess an IT organization you are familiar with using the Balanced Scorecard approach.

Assess an IT organization you are familiar with using the Balanced Scorecard approach. 
Be sure to 

(1) address at least one KPI including hypothetical goal, measure and target for each of the four perspectives (financial, customers, etc.) in tabular format and 

(2) draw or sketch out a dashboard for your scorecard. 

Include a brief narrative (at least two sentences) explaining your specific scorecard as it relates to the organization. 

 

You might want to review the below video first.

https://youtu.be/AdXt8BfiGJg 

Experimenting and Testing (WEB ANALYTICS)

 Please note, points will be deducted for overuse of citations.  

  please feel free to explore your own research for eBooks, journals and articles that best answer the topics and assignments.  Do your best to locate resources that are no more than three (3) years old. PLEASE DO NOT USE WIKIPEDIA AS A RESOURCE AND OR REFERENCE. 

Please submit a Word Doc with your answers in 500 words or more, and use APA references in support of your answers.

Some resources are attached for help, you may use that for help as well. 

 Explain in your paper how to build a successful testing program, demonstrate the importance of understanding user interactions. 

 Explain the importance of setting goals before you test.  Explain how the web analyst should be aware of visitor site usability. 

 Include why a hypothesis is so important. Explain the importance of testing and settings goals and the hypothesis. 

FP

 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  • This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  • Introduction
  • Roles and Responsibilities
  • Incident Response
  • Plan Activation
  • Document History
  • Procedures

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cyber Terrorism

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

mad pratical connection

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(Enterprise Risk Management (ITS-835-B08))  have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study(Fall 2020 – Enterprise Risk Management (ITS-835-B08) ). 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

Assignment

urgent

On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Please write a 500-word summary of fair use as this court decision says it.