Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

SLP 1 – 80

I need help on my assignment 

Module 1 – SLP

Strategy and Strategic Planning

Review this 


comprehensive review of strategic planning


. The website is the brain-child of Dr. Ross A. Wirth, who has extensive experience in management consulting. However, the website is about general strategic planning, rather than IT planning. While you are learning from the website, you should consider the IT context. Here is an 


IT plan for the US Patent and Trademark office


.

·

Do the general principles and strategies of strategic planning apply to IT planning? What may apply, what may not, and why?

Please write a 2- to 3-page article to answer the above questions. You can start by pondering about what IT is so special that its planning differs from the general strategic planning. You can choose to either discuss comprehensively of many perspectives or focus on two or three main perspectives that strike you the most. Bring your own experiences to support your arguments. If you don’t have any relevant experiences, ask your colleagues or those who handle strategic planning in your organization. You can also do some search on the Internet or at the Trident Online Library to find some references.

Submit your paper upon completion.

Use information from the modular background readings, please cite all sources, and provide a reference list at the end of your paper.
The following items will be assessed in particular:

1.
Your ability to evaluate the provided IT strategic plan.

2.
As with the Case Assignment, writing, spelling, sentence and paragraph structure will be assessed.

SLP Assignment Expectations

Length: Follow the number of pages required in the assignment, excluding cover page and references. Each page should have about 300 words.

Your assignment will be graded according to the MSITM SLP Grading Rubric.

Module 1 – Resources

Strategy and Strategic Planning

There is an open debate as to whether there should be a distinct information technology strategy separate from the enterprise strategy of a corporation. Part of this debate is understandable. Should not all divisions of the company be guided by the enterprise-level strategy? If you find that logic compelling, let me offer an example to try to convince you otherwise. Most for-profit companies have an enterprise-level strategy that is some version of grow revenue. Marketing, sales, product or service divisions, IT, and other business units or functional areas will play a role in driving that revenue.  Each of those divisions of the company needs to develop their own strategies to better articulate their plans, but also to be sure that the entire division understands the substance of the plans and is pushing in the same direction to accomplish the strategy. It also helps each division to focus on the projects or initiatives that will ensure that the strategy is accomplished. Enterprise strategy is often vague by design.

Corporate strategic plans often are written with the expectation that the real work to accomplish them and therefore a translation of sorts will happen where the rubber meets the road for the company in the divisions. It is the translation of that strategy into the divisions of the company that help define specific ideas of how that strategy will be enacted. Let us remember that a good strategic plan is as much about what a company is not going to do as it is about what it is doing. The specificity of divisional plans helps focus the company. Those ideas that are not articulated in the plan should not be pursued.

The IT department is one of the few divisions of the company that touches every part of the company. The IT team is ideally suited to work with the leaders of all other divisions on their plans with a special focus on advising them on how best to bring to life those plans through better use of information and technology. Just as important, members of the IT team are positioned to see strategic priorities that are in common or that diverge for multiple parts of the company that may not even occur to the divisional leaders who propose them. As such, the IT team can help ensure that common strategic priorities are addressed commonly, or diverging needs are reconciled where necessary. In reviewing all other divisional plans, the IT leadership team will be well positioned to understand where emerging demands for technology may not yet have a supply of resources, processes, or tools to support them. That opportunity or disconnect may well lead to a strategic priority within the IT strategy.

With the strategy declared and shared, the IT team can take the necessary actions to ensure that the supply of a technology meets the demand for it by the rest of the organization. In short, the leaders of the other divisions should articulate the what, and IT leaders should articulate the how. This give and take between the other divisions and IT must be free flowing. The conversations should be frequent and IT should strive to be part of the conversations at the point at which demand is first articulated. Too often, by not having a regular cadence or even the forums for these conversations, IT finds out about new strategic priorities only after they’re fully formulated.

That’s the point when the plans are less malleable. If IT leaders can get involved earlier in the process they can advise colleagues on the art of the possible. As the IT team’s ability to do this improves they will increasingly be invited to weigh in on more strategic imperatives, creating a cycle. Therefore, IT leaders need to get more actively involved in the strategic planning processes of each division of the company, and use those conversations to inform IT’s own strategic plan. Were IT to only act against the enterprise-level strategy, IT would be stuck in a reactive mode, rather than being a prime driver of the direction of the company.

Required Reading

Use 

How to find resources in Skillsoft
 to access material in Skillsoft.

Bankuti, M. (2021). The Strategy Analysis Knowledge Area Course. Available in the Trident Online Library in Skillsoft. 

Fernando Almeida, & José Santos. (2018). 
The Business Plan Reference Manual for IT Businesses. River Publishers.

Mitigating security risks: Cyber security risks course. Available in the Trident Online Library in Skillsoft. 

Mayo, S. (2022).  Executiv
The Business Plan Reference Manual for IT Businesses.e’s guide to cyber risk: Securing the future today. John Wiley & Sons, Chapters 1 – 4. Available in the Trident Online Library in Skillsoft. 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

VIII

see attached Prepare a three- to four-page essay that addresses the following questions. · Which emerging threat (e.g., cyberterrorism, domestic violent extremism, AI misuse) do you believe poses the greatest long-term risk to homeland security, and why? · How can homeland security professionals balance innovation with ethical responsibility? · How

HLS VII

see attached Policy Memo: Rising Terrorist Threat This writing assignment measures your mastery of ULOs 1.1, 1.2, 1.3, and 4.2. In this assignment, you will craft a professional policy memorandum advising a senior government official (e.g., Secretary of Homeland Security, State Homeland Security Advisor, or Governor) on how to respond

In-the-Wild Studies

 In a field study or an in-the-wild study, how can designers ensure they acquire accurate data concerning the product? Briefly describe some concerns associated with properly conducting field studies. 

Evaluation Methods

  Overview In this activity, you identify methods to evaluate your application interface that align with stated requirements and specifications. This activity will inform next week’s assignment, where you are asked to create an evaluation plan for your application. Instructions Explain 5 appropriate ways or methods to evaluate your chosen

VII

see attached There are numerous artificial intelligence applications used in homeland security for defense, intelligence, diplomacy, surveillance, cybersecurity, and other areas in both the public and private sector. For this assignment, you will create a PowerPoint presentation which examines current and emerging artificial intelligence (AI) and machine learning technologies being

Formative and Summative Evaluations

 What are the differences between formative evaluations and summative evaluations? At which stage in product development do you believe that evaluations should use controlled settings instead of natural settings? Why? 

V HLS

see attached The Office of Innovation and Collaboration is the Department of Homeland Security (DHS) Science and Technology (S&T) Directorate’s conduit to a broad network of external partners. It provides the homeland security community outreach and access to partnerships with world-class subject matter experts, resources, and innovative tools. Discuss why

VI

see attached. For this assignment, you will develop a PowerPoint presentation consisting of 10 to 12 slides that examines one of the 16 critical infrastructure sectors designated by the U.S. Department of Homeland Security. You will explore key threats to the sector and its cybersecurity vulnerabilities. You will propose realistic

Information Systems IT assignment

Case Study Analysis — Jaguar Land Rover Cyberattack Assignment Overview In August 2025, Jaguar Land Rover experienced a ransomware and data exfiltration attack that forced a complete shutdown of IT and manufacturing systems across its global operations. This disruption caused significant financial losses and supply chain delays. Analyze the incident

V

see attached For this discussion, reflect on how the United States has approached intelligence sharing since 9/11 and consider whether the balance between security and individual rights has been successfully maintained. Think about the roles that fusion centers, joint terrorism task forces (JTTFs), and local law enforcement play in identifying

excel

c ase study – Survey Analysis This case study will grant you the opportunity to utilize your critical thinking and data analysis skills. In business, surveys are often a common way to gauge consumer sentiment. In the provided data set, you will analyze Excel data gathered from a customer satisfaction

IV

see attached. In this unit’s lesson, we explored constitutional law, civil liberties, and ethical decision-making in homeland security. These issues become especially acute during large-scale disaster scenarios, where federal and local agencies are called upon to make time-sensitive decisions under conditions of uncertainty, chaos, and public vulnerability. These actions must

4

see attached. Reflect on your beliefs regarding the ethical implications of the United States using unmanned aerial vehicles (UAVs) on foreign soil to counter terrorist attacks in defense of our own or foreign ally interests. How do you believe other nations perceive the United States’ use of UAVs to monitor

HIMS 655 ASS5

As a HIM director of a healthcare system, you have been assigned to lead a team of individuals to develop a rationale for a Health Data Governance Program. In your first team meeting the agenda is to discuss various aspects of successful Health Data Governance Program.  Discuss with your team

The Role of UX in Software Development

  Review this week’s assignment, Application Requirements and Specifications. Discuss the role that the user experience (UX) plays in the development of software requirements. How can UX considerations be effectively integrated into your Requirements and Specifications?

HLS III

see attached. For this assignment, select a disaster or terrorism incident (e.g., Hurricane Katrina, Hurricane Maria, Texas Winter Storm) and analyze how each phase of the emergency management cycle was executed. Additionally: · Evaluate FEMA’s role in support of both local and state agencies and associated legal frameworks. · Examine

3

See attached. In 2001, lone wolf terrorist and bioweapons expert Dr. Bruce Ivins, mailed several United States Postal Services (USPS) letters and parcels filed with anthrax spores to news media outlets, democratic senators, and others. This terrorist incident was considered a weapon of mass destruction (WMD) attack, as anthrax is

II

see attached. The United States homeland security enterprise is intentionally decentralized, relying on a complex interplay between federal and state agencies, local authorities, and community stakeholders. The National Incident Management System (NIMS), the National Response Framework (NRF), and the whole-community approach are designed to create integration and interoperability but not