Information technology strategic plan

Assignment Help Basic Computer Science
Reference no: EM131201470

Assignment:  Information Technology Strategic Plan

Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty. The company hired you because of your expertise with mobile apps, social media, and cloud technology. The management of the company feels that yearly revenues could top $20 million per year with the infusion of current technology. Currently the company has revenue of $5 million per year.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Write an eight to ten (8-10) page paper in which you:

  1. Write an introductory statement of the company including but not limited to the type of the company, the location, the industry in which it competes, and the organizational vision and mission that encompasses the nature of the company. 
  2. Specify the current situation of the company with regard to its technology and security aspects.
  3. Determine at least five (5) information technology personnel / roles that would be in place in order to start the business venture of gaining better traction of customer satisfaction and loyalty. Justify your response.
  4. Conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis for the business venture in question for the company. Justify your response.
  5. Develop at least five (5) major goals for the information technology strategic plan. Justify your response.
  6. Speculate on three (3) positive organizational impacts of implementing the strategic plan. Justify your response.
  7. Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131201470

Questions Cloud

Fetch-execute cycle for an add instruction : You may assume that the op code part of the instruction uses IR [high] and that the address is found in IR [low]. Write the fetch-execute cycle for an ADD instruction on this machine.
Calculate the average total equity : FINM4000 Assessment. Using information available within Qantas 2016 Preliminary Final Report consolidated financial statements compute average equity-levels for 2016 and calculate the average total equity
Compute the triggering angle of the converter : A 120V full-wave SCR battery charger is designed to provide 1.0A of charging current. The battery has 1Ω internal resistance. At the beginning of the charging process, the voltage of the battery set is 60V. Compute the triggering angle of the conv..
What you consider the correct accounting treatment should be : Describe a situation in which two of the main accounting concepts might be in conflict. - Explain what you consider the correct accounting treatment should be.
Information technology strategic plan : Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty.
Identify the method of reinforcement being used : Identify the behavior that the mom is trying to reinforce. Identify the method of reinforcement being used. Explain possible reasons for this method working for one child and not the other.
Compute the rms voltage across the load : A full-wave, ac/dc converter is connected to a resistive load of 5Ω. The voltage of the ac source is 120V (rms). If the triggering angle of the converter is 90°, compute the rms voltage across the load and the power consumed by the load.
What is the projected net income for 2015 : What is the projected net income for 2015?-- What is the breakeven point in revenues for 2016 if the additional $16,500 is spent for advertising?
Process of data recovery : 1) Why is RAID 1 not a substitute for a backup? 2) Explain the process of data recovery in case of a drive failure in RAID 5?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create an xslt style sheet for one car element of the xml

Modify the XSLT style sheet of exercise #4 to format all the car elements in the xml document of exercise #2, and use the style sheet to create a display of the whole document.

  Day trader wants to invest a sum of money

Day Trader wants to invest a sum of money that would generate an annually yield of at least $10,000. Two stock groups are available: blue chips and high tech, with average an annual yields of 10% and 25%, respectively

  Limitations of palmtop or handheld computers

What are the advantages and limitations of palmtop or handheld computers (including smartphones)? Do you have one? If so, for what do you use it? If not, what features would be particularly attractive to you?

  Calculate the number of nodes receiving query message

How do you calculate the number of nodes receiving a Query message from a root node or a leaf node when you have either a Gnutella Topology which looks like a balanced ternary tree with 5 levels (121 nodes total) and TTL=3.

  Formulate this problem as a minimum cost flow problem

Formulate this problem as a minimum cost flow problem involving a copy of the given graph for each time period.

  General solution of the wave equation

After proving that this is an hyperbolic PDE show that its general solution (without Cauchy data) is similar to the general solution of the wave equation (uxx - v2uyy) with v equal to the propagation speed.

  What makes these pairs transitive

What I dont understand is how these pairs are considered transitive. My question is what makes these pairs transitive?

  College of engineering and information sciences

What interests you about the college of Engineering and Information Sciences? What area of IS interests you the most? Did something or someone inspire you? Or, are you here to test the waters?

  Emerging cyber security approaches and technologies

Write an 18 page (or longer) paper in which you identify and assess emerging cyber security approaches and technologies as well as discuss government efforts to nurture the development of these emerging technologies.

  Define the roles and responsibilities of the members

define the roles and responsibilities of the members of the department.

  Good coding practices with a meaningful coding example

Documentation of good coding practices with a meaningful coding example

  Does standard unix operating system use nondiscretionary

Does the standard Unix operating system use a nondiscretionary access control? Explain your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd