Verified Document

Information Technology IT Planning Processes Term Paper

IT Planning Processes Efficient IT technology planning is an involved process. It requires a dedication of time and resources ranging from senior managers to other employees. To arrive at proper decisions, an organization requires comprehending important facets of technology. However through technology planning, organizations are able to make important benefits to the organization. Better management of technology results in enhanced output, higher morale among employees, and superior service to customers through functional devices, networks which give access to information, and applications, which are suitable for the mission of the organization. Information can change organizations by way of handing over to them instruments to appreciate the settings in which they are performing, to gauge the efficacy of their actions and to counter contrasting information from other groups and policy makers. (What's involved in Technology Planning?)

In IT planning process there are seven phases: (i) Forming leadership and support: Forming a technology team and making sure management and employee buy-in will permit one to start off backed by the whole organization. (ii) Resource assessment: The initial step in planning is evaluating the existing technology. What is available in place and how well is its operational? (iii) Need definition:...

(iv) Exploring solutions: Researching contemporary technology alternatives and finalize on those which fulfill the needs of the organization at a low cost. (v) Writing the Plan: The written plan must document one's resources, requirements and solutions as also the funds constraints. (vi) Getting funding: The technology plan can be used as the major component to find out funding for technology. (vii) Implementing the Plan: After fixing a timeline, assigning responsibilities and assessing the progress will make the plan practicable. (What's involved in Technology Planning?)
Every organization can be categorized into three stages of operation -- Strategic, Tactical and Operational. The Strategic level is normally made up of the chief executive officer and his executive management. They characterize the overall mission statement for the organization, putting its focus and direction. They formulate strategic level goals and objectives that will be carried out at the tactical and operational levels. In addition to this they set strategic level strategies that will set the organization on its preferred course. The…

Sources used in this document:
References

"An Introduction to Strategic Planning" Farrell & Associates Pty. Limited

Retrieved from http://www.farrell-associates.com.au/Papers/Intro%20to%20Strategic%20Planning.pdf#search='Strategic,%20tactical,%20and%20operational%20levels%20in%20Information%20Technology%20planning%20at%20the Accessed on 24 January 2005

"What's involved in Technology Planning" (April 29, 2000) Retrieved from http://www.techsoup.org/howto/articlepage.cfm?articleid=33&; topicid=11& CFID=468040& CFTOKEN=80761241 Accessed on 24 January 2005
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology to Transform a
Words: 2228 Length: 6 Document Type: Term Paper

And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either

Information Technology an Effective Project
Words: 1908 Length: 6 Document Type: Essay

It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of

Information Technology Aquarius Marketing Project
Words: 3970 Length: 12 Document Type: Term Paper

Migrate off of any individualized content management systems and processes not integrated to a single portal platform for greater cost and time savings in administration. Olson (32) provides an excellent case study on how universities are making use of open source portal applications to alleviate redundant and often conflicting data in multiple portals on an IBM WebSphere platform Define and build out a portal development plan that encompasses all shared processes

Information Technology Amazon.com Situation Analysis
Words: 1450 Length: 5 Document Type: Term Paper

Hence the development of the Open Systems Interconnect (OSI) Model which lead to the development of the Internet and the Ethernet standard and the TCP/IP protocol, both of which nearly the entire Internet runs on today. #9, in what way have phones and computers converged? Why is this convergence occurring? The personal productivity tasks of communication as it relates to the use of telephones and computer systems has long been an

Information Technology Project Management Discuss
Words: 1263 Length: 4 Document Type: Term Paper

Often information systems projects require two or more project teams to collaborate with one another to complete critical foundational elements of a new information system, and the dependences of each of these tasks needs to be shown and clearly communicated to all members of a project team. In addition, these tools and techniques must also take into account the requirements of the entire lifecycle of the product (Stewart, 203).

Information Technology -- Managing Information
Words: 564 Length: 2 Document Type: Essay

Vandalism Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now