It Security And Acquisition Strategy Acquisition Strategy Term Paper

It Security and Acquisition Strategy Acquisition strategy statements are important documents for gaining and maintaining executive support for programs and projects. What in your view are the one or two biggest challenges in developing an acquisition strategy? Give your reasons and any suggestions you have for addressing the challenge(s).

In my view, the biggest challenge arising in connection with developing an acquisition strategy is the need to communicate potentially complex technical concepts and rationales to a wide variety of stakeholders. In principle, the acquisition strategy statement must be capable of promoting "buy-in" at every level from executive leadership to management, and to individual business units and employees. Each of these groups of stakeholders typically focuses on different concerns that depend on and relate in different ways to information technology (IT) infrastructure and processes. Similarly, the needs and capabilities of IT systems are potentially very different in the way that their adoption affects all of these stakeholders in their respective responsibilities.

From the perspective of some stakeholders, proposed IT system acquisitions...

...

Conversely, other stakeholders may have specific reasons for reacting differently (i.e. negatively) to the same prospective acquisitions and other IT system changes. Therefore, the effectiveness of the acquisition strategy statement is substantially a function of how well its writers and organizers anticipate the many different ways that the proposed changes could impact different levels of management, business units, and end users. They must be able to garner support from each different group of stakeholders by articulating the specific advantages that the proposed acquisitions represent. To do that requires a comprehensive understanding of the ways that every potential stakeholder relies on and uses the existing IT systems and relates the new acquisitions to the benefits that those different stakeholders will derive from the proposed changes.
2. How should an organization decide on how "cutting edge" it should be in its IT acquisition strategy? Acquiring cutting edge IT might give it a competitive advantage, but at greater risk because the IT is cutting edge. On the other hand, the use of…

Cite this Document:

"It Security And Acquisition Strategy Acquisition Strategy" (2011, October 21) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/it-security-and-acquisition-strategy-acquisition-46688

"It Security And Acquisition Strategy Acquisition Strategy" 21 October 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/it-security-and-acquisition-strategy-acquisition-46688>

"It Security And Acquisition Strategy Acquisition Strategy", 21 October 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/it-security-and-acquisition-strategy-acquisition-46688

Related Documents

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Acquisition Merger Acquisition International Strategies Merger, Acquisition, International Strategies Merger, Acquisition, International Strategies For the corporation that has acquired another company, merged with another company, or been acquired by another company, evaluate the strategy that led to the merger or acquisition to determine whether or not this merger or acquisition was a wise choice. Justify your opinion. Corporation With around 12,000 employees, Yahoo is a multinational corporation that offers internet-based services. The company offers search engine,

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Strategies to improve collaboration and cooperation between the Homeland Security agencies The department of homeland security (DHS) controls the territorial, local, state, tribal, and federal government resources (DHS, 2018). The DHS coordinates various programs and agencies into one single and unified effort that is given to protecting the American homeland and the people. The first QHSR (Quadrennial Homeland Security Review) was completed in the year 2010 with an objective of establishing

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are: