Strategic Information Technology
The three options for organizational strategies that will be discussed are the global strategy, the cooperative strategy and the E-business strategy. A global strategy implies an international presence for an organization. This international presence may translate into production outlets in foreign countries or presence on foreign markets or a combination of the two.
Porter (1986) was one of the first who conducted studies on global strategy. As more and more companies operated in similar economic systems and implemented technological change that made them more efficient and productive, the incentive was to expand on an international level, in order to benefit from emerging markets, from new resources (often at lower costs) and from economies of scale that could thus be generated.
Many of the large multinationals are employ a global strategy. Some of the most eloquent examples include Coca-Cola, Apple Computers and many of the car producers such as Ford or Toyota. Many of these...
Strategic Information Technology Plan Oesterlen Services for Youth is an organization that helps troubled youth in Ohio. It consists of a counseling center and a foster care placement program, as well as residential services for both male and female youth for intensive care cases. In order for Oesterlen to continue to help as many youth as possible, it has to be up-to-date on its technology. To that end, it has set
End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a
The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the
This must be avoided at all costs because not only do we set up ourselves and the company for disgruntled passengers, we are also making ourselves liable because the flights are leaving earlier than they are supposed to. This should not happen at all, but in the event that it does, we must do everything in our power to get the customer on a similar flight to the one
Hence the development of the Open Systems Interconnect (OSI) Model which lead to the development of the Internet and the Ethernet standard and the TCP/IP protocol, both of which nearly the entire Internet runs on today. #9, in what way have phones and computers converged? Why is this convergence occurring? The personal productivity tasks of communication as it relates to the use of telephones and computer systems has long been an
Implementing a private Cloud-based ILS will give each department real-time availability of data from both the ECM and EKM systems, tailored to the specific roles through the use of customizable ILS-based interfaces. One of the most critical success factors of implementing any new enterprise system is to plan for making everything form the workflows to individual screens as permeable and customizable as possible (Lampert, Vaughan, 2009). This is essential
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now