In this era of emerging technology, the organizations are completely dependent on advanced technologies. They develop strategies for implementing and using information technology in the organization. IT strategy is a well developed plan that is used by the IT professionals of an organization (Arvidsson, Holmström and Lyytinen 2014). IT strategy covers the information regarding technology management, cost management, software as well as hardware management. It also includes risk management plan and risk mitigation strategies that are involved in dealing with IT management. Development and execution of IT strategy needs strong leadership. The chief information officer plays an important role in this process.
This report discusses about the roles and responsibilities of the main stakeholders in the organization like CEO, CFO, CIO, CCO and external customers. The top five concerns of these stakeholders are also discussed. The business situation, needs and priorities are also discussed in details (Cassidy 2016). This report also gives a brief idea regarding the organizational structure as well as its capabilities. This report also discusses about the business challenges as well as IT risks that are involved in an organization. This report gives a brief idea about the budget of that will be required by the IT department.
The main stakeholders and their roles are explained below.
CEO: Chief Executive Officer is the head of the management team. They are responsible for developing IT strategy and policy for the entire organization (Chou 2013). They are responsible for making strategic level decisions.
CFO: Chief Financial Officer makes the financial budget of the entire organization. They are responsible for financial planning of the IT strategy. They plan about the IT resources along with its cost.
CIO: Chief Information Officer is the head of the information technology. Their main responsibility is to develop strategic goals for the purpose of increasing the accessibility of information. They are responsible for managing integrated systems.
These stakeholders play a major role in the developing IT strategy (Zissis and Lekkas 2012). Security and data breach is the main concern for the organization. Information technology is vulnerable to several threats and risks. These threats and risks can cause loss of sensitive data and affect the users. Data loss can also affect the reputation of the organization. The organization must incorporate strong security policies in its IT strategy for the purpose of protecting the valuable data of the organization.
The business situation of Qantas has been analyzed. The following information is found out from its analysis:
Strengths: The strength of a company must be maximized. Their strong expertise and their dedication are considered to be their main strength. The service quality provided by the organization is said to be top rated (Zissis and Lekkas 2012). They have a strong network in their campus. IT solutions provided by this company is well rated. They provide unique IT solutions and have competitive advantage over its competitors.
Weaknesses: Funding, staffing levels and strategic planning of the company is considered to be its weaknesses. There is no effective governance and there is lack of coordination among the staffs. There are certain flaws in the strategic plan that is developed by the company. There is no transparency in the decision making and planning process of the organization (Peppard and Ward 2016). These weaknesses must be minimized.
Opportunities: IT is an emerging sector. This company has several opportunities to grow and develop its business. There are several for growing its business. They have the opportunity to build new products and services.
Threats: There is huge competition in the IT market. The company is under threat because IT companies are growing at a fast face and it might affect the business of Qantas.
The IT strategy must be developed in order to maximize its strengths and minimize its weaknesses. They must aim at taking advantage of the opportunities and overcoming the threats. The strengths and weaknesses of the company are internal to the company and therefore these can be controlled. The opportunities and threats of the company are extrinsic to the company and these are not under the control of the company.
The company must be able to deliver efficient IT products and services to the clients. The customer needs must be identified in order to develop a product that will satisfy the customers. The products and services must be able to create value for the customers (Stair and Reynolds 2013). The performance of the products and services must be high level. Strong security features must be incorporated in the business plan and IT strategy in order to protect the sensitive information of the users and in order to protect the reputation of the company. Their main expectation and requirement is to reduce failure of any project. The Agile model of SDLC is suitable for developing any software. It begins with feasibility study, design phase, implementation, testing followed by maintenance. The users will be allowed to participate in this process so that there is less chance of failure. Another expectation is to satisfy the customers. The company must know its customers and meet their needs by providing correct IT solutions. The company expects to develop a proper IT infrastructure that will be efficient and it will not lead to operational failure. The CEO expects the company to follow the strategic plan developed by him in an effective manner (Rainer et al. 2015). The CIO is the head of the IT department expects that the IT project will be carried out with no failure. CFO and CIO expects that strong security policies to be implemented in order to protect sensitive data. The CFO expects the company to follow the business plan in a proper manner so that there is no financial loss.
Security: IT security is given the first priority because the company contains sensitive data (Stair and Reynolds 2013). Loss of valuable data will affect the users and the reputation of the company.
Training needs: This is given second priority (Cassidy 2016). The employees need proper training in order to operate the IT systems and to remain productive with the changing work environment (Van De Walle, Turoff and Hiltz 2014).
Financial needs: This is given the third priority. The company must be financially stable in order to remain productive.
The organization is an IT based and it provides technical support and services to their customers. The Structural representation of the organization is given in the table below,
The organizational structure includes the development of a stratified and improved functional analysis. The structure of the organization are divided into three levels are management level, executive levels, and operational level. Each of the levels includes some human resources and their combined activities would develop the support for the integration of the operations (Rainer et al. 2015). The executive level comprises of CEO, Managing Director, and Directors. The executive level would provide the decision activities and implementing the profound development. The management level includes the Production Manager, General Manager, IT Manager, and Sales Manager. The management level would comprise of managing the operations and it would result in forming the completion of the organization’s operations. The operational level includes technicians and clerks and they would realize the operations of the organization.
The IT organization would comprise of the integrating the operations and development for the integration and alignment of the operations (Peppard and Ward 2016). The various business risks for the organization are deficit in profit, lack of resources, design issues, and flaw in the operations. The risks factors can be mitigated as mentioned in the table below,
Risk |
Mitigation Strategy |
Deficit in Profit |
Use of provisional plan for improving the operations |
Lack of Resources |
Contingency budget allocation |
Design Issues |
Use of effective design system would be allowed for the development of the system |
Flaw in the Operations |
Align of the operations in the integrated time duration |
There are several information technology challenges or risks that are usually faced in any organization. The main challenges or risks are as follows:
iii) Nefarious Activities: These are the most dangerous types of risks or challenges in information technology in any organization. These types of activities mostly occur when an intruder or hacker has wrong intentions (Laudon and Laudon 2015). He wants to intrude into a system and this causes to lose the information and data forever. The basic examples of nefarious activities are virus, malware, malicious activities and many more.
However, the above mentioned IT challenges and risks can be reduced or mitigated by certain approaches or steps. They are as follows:
The above mentioned approaches are helpful in mitigating the IT risks and challenges.
The information technology has several processes within it (Alhawar et al. 2012). The main processes of information technology are as follows:
iii) Integration Planning and Initiation
The information technology of the mentioned organization is cloud. It is based a cloud based infrastructure. Cloud is the best technology for transferring any data or information from any part of the world.
The IT operations are managed by the process of service monitoring in this company (Alur, Henzinger and Vardi 2015). This service monitoring makes sure that plan of service management is perfect.
Enterprise architecture is the practice for conducting the planning, design, analysis and implementation of a particular enterprise with the help of a comprehensive approach. This type of enterprise architecture is directly connected to an information system.
Budget and spending plays the most important role in any organization (Buede and Miller 2016). When this organization is starting or initiating its new project. The annual budget of the IT department of this particular organization is around 1 million dollars. Best effort means that the difficulty in getting budget information is acknowledged.
Conclusion
Therefore, from the above discussion it can be concluded that, in this era of emerging technology, the organizations are completely dependent on advanced technologies. They develop strategies for implementing and using information technology in the organization. IT strategy is a well developed plan that is used by the IT professionals of an organization. IT strategy covers the information regarding technology management, cost management, software as well as hardware management. It also includes risk management plan and risk mitigation strategies that are involved in dealing with IT management. Development and execution of IT strategy needs strong leadership. The chief information officer plays an important role in this process. The above report discusses about the roles and responsibilities of the main stakeholders in the organization like CEO, CFO, CIO, CCO and external customers. The top five concerns of these stakeholders are also discussed. The business situation, needs and priorities are also discussed in details. This report also gives a brief idea regarding the organizational structure as well as its capabilities. This report also discusses about the business challenges as well as IT risks that are involved in an organization. This report gives a brief idea about the budget of that will be required by the IT department. The discussions are done on the basis of proper justifications.
References
Alhawari, S., Karadsheh, L., Talet, A.N. and Mansour, E., 2012. Knowledge-based risk management framework for information technology project. International Journal of Information Management, 32(1), pp.50-65.
Alur, R., Henzinger, T.A. and Vardi, M.Y., 2015. Theory in practice for system design and verification. ACM Siglog News, 2(1), pp.46-51.
Arvidsson, V., Holmström, J. and Lyytinen, K., 2014. Information systems use as strategy practice: A multi-dimensional view of strategic information system implementation and use. The Journal of Strategic Information Systems, 23(1), pp.45-61.
Buede, D.M. and Miller, W.D., 2016. The engineering design of systems: models and methods. John Wiley & Sons.
Cassidy, A., 2016. A practical guide to information systems strategic planning. CRC press.
Chou, T.S., 2013. Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3), p.79.
Goetsch, D.L. and Davis, S.B., 2014. Quality management for organizational excellence. Upper Saddle River, NJ: pearson.
Hilpert, H., Kranz, J. and Schumann, M., 2014. An Information system design theory for green information systems for sustainability reporting-integrating theory with evidence from multiple case studies.
Laudon, K.C. and Laudon, J.P., 2015. Management Information Systems: Managing the Digital Firm Plus MyMISLab with Pearson eText–Access Card Package. Prentice Hall Press.
Peppard, J. and Ward, J., 2016. The strategic management of information systems: Building a digital strategy. John Wiley & Sons.
Petter, S., DeLone, W. and McLean, E.R., 2013. Information systems success: The quest for the independent variables. Journal of Management Information Systems, 29(4), pp.7-62.
Rainer, R.K., Cegielski, C.G., Splettstoesser-Hogeterp, I. and Sanchez-Rodriguez, C., 2013. Introduction to information systems. John Wiley & Sons.
Stair, R. and Reynolds, G., 2013. Principles of information systems. Cengage Learning.
Van De Walle, B., Turoff, M. and Hiltz, S.R., 2014. Information systems for emergency management. Routledge.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation computer systems, 28(3), pp.583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download