IT Acquisition Management for a new Video Shop
Individual Project Activities
Identification of a problem
Organization:
Component:
Showtime Video Store
Business Capture Group
The problem is that there is no real information technology security measure employed in the video shop. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement and stealing from their shop.
Business Activities and Processes Affected by the Problem
The problem directly affects all products and videos that are at the disposal of the customers online as well as on-site.
Actual Performance (e.g., current baseline)
The guidelines associated to the informational security strategy should incorporate contingency actions which will facilitate the video shop to endure any discrepancy or calamity and tackle it audaciously. Actions like incorporating data storage and extraction with the use of data-warehousing and data-mining techniques, preserved paraphernalia, and implementing DBMS-Database Management System are of immense significance for enabling the overall functionality to be persistent.
Target Performance
* Assemble the organizational information security strategy for the video shop:
Managerial executives of a dynamic video shop entity should endow appropriate guidance on the basis of their own experience and expertise, systematize the informational security guidelines entailing; generate efficient methodology, mechanism, augment procedural methodologies, and ascertain accurate filing of the procedural methodologies.
* Ensure employee acknowledgement:
To adhere to the strict and dedicated implementation of the video shop's information security guidelines, each and every personnel should comprehend its significance by supplying an explicit recognition of ratification of these guidelines.
* Ensure confidentiality agreements:
Explicitly illuminate and formulate surreptitious accords, which will facilitate the video shop entity in those stances where external participants and parties are engaged with the corporation in ventures which necessitate strict correspondence in conveying data pertaining classified information.
* Guarantee the security of the material used in the premises and informational equipment:
Workplace paraphernalia entailing; procedural filings, details concerned with methodological data, intranet related to the hardware and software, wiring and other vital aspects of the corporation should be addressed with utmost priority, and protecting them should be of greatest precedence.
Performance Gap
The performance gap is definitely in the lack of IT measures and their awareness at the administrative level. This leads to a deficit of IT applications to increase security.
Organizational KPIs Affected
Sales revenue, return on assets, return on investment
Principal Stakeholders
Chief Executive Officer, Video Distributors, manager of IT Department
Tentative Solution Strategy
Investigate the feasibility of the current security measures that are applicable in the video shops with similar structures. Use those strategies as measures to customize the IT security measures and then implement them with backup contingency plans that will be applicable for different risk scenarios.
Acquisition Need Confirmation
IT security measures will definitely solve this particular concern and shortcoming in the security measures of this video shop and the IT services will be necessary with the passage of time.
Template 2: Documentation of Requirements
OBJECTIVE OF THE REQUIREMENTS:
Ethics
REQUIREMENTS CATEGORY
REQUIREMENTS DEFINITION
1. Workforce Considerations and Obligations in the Security Matrix
All the personnel should have the comprehension of their obligations, which are aligned to the anticipations of the video shop. As encountered by Siemens, the corruption inquiry instigated the managerial executives to entail the ethical values and a belief from the lowest portion of the personnel to the highest most personnel, this technique was in contrast to the usual practice of teaching the top tier first then moving downwards towards the lower half of the organization hierarchy.
2. Generating E-business Evaluation Programs with regards to legal rights as well as the competition
1. Website portal
2. Use of passwords and firewalls
3. Use of back-up drives
4. Attaining rights of distribution from the suppliers
5. Attaining online business ventures
3. New Functionalities for E-business Solutions
When instigating a profit generating venture it's a prevalent practice that all the associated aspects which can be affirmative or negative should be comprehended. Although, the aspects for a video-based venture will be of diverse nature as compared to that of a conventional venture. The most effective stance for the comprehension phase of any venture is that the prime motive of the estimation should be congruous as well as focused on the presumed achievement factors.
4. Existing Business Shortcomings and Pitfalls
There is little to no personnel currently employed in the firm who can assert and implement the necessary security measures needed for the video shop.
The video shop is a new business, hence has very limited network of suppliers and contracts from distributors
5. Cost Limitations
Anticipated cost...
The potential of the Internet has been acknowledged by UPS and the company has made a commitment to enable global commerce via the Internet. This challenge and the changing needs in terms of customer due to the e-business evolution has UPS looking a variety of business solutions. Analysis Present systems and services are as follows: 1. UPS e-Ventures: A "corporate incubator for UPS that "explores ideas and takes the great ones and
Another study found that there are many different strategies that are utilized when information technology is developed within the federal government and many of these tend to come not from the top managers but from the management instead (Gupta, Holladay, & Mahoney, 2000). Much of this has to do with the fact that the top managers in the federal government are often political appointees and therefore know somewhat less about
And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either
Information Technology The reference company is the oil giant Chevron. Because there is a growing demand for the development of Internet, intranet, and extranet business-to-business (B2B) transaction capabilities, the Stamford, Connecticut -- based Gartner Group predicts that by the year 2004 more than 50% of all enterprises will use the Internet for more than 80% of their external procurement activities. Meanwhile, almost every company offering products and/or services has developed or
Information Technology (IT) is a broad-based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new, appearing in a 1958 article in the Harvard Business Review in which the authors said, "this new technology does not yet have a single established name. We shall call it information technology (IT)" (Dunn,
Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now