Blog

Strategic IT Plan

Strategic IT Planning: Your 3-Step Process

Introduction

Strategic IT Planning is required to ensure your resources and assets continue providing the results and the support your organization needs.

What is a Strategic Plan?

It is a roadmap to achieving a goal. It may cover your entire department or responsibility or it may focus on a specific issue or element of your role. It can be long and involved or a simply one-page document that provides guidance and steps you need to implement to achieve a goal.

Making it Happen

There are a few things that are important to your success. While it may seem that developing the Strategic Plan is the hardest part, most plans fail because of the implementation. The key is to keep it small and be successful, then build on that success for the next initiative. Don’t bite off too much or try to be too ambitious.

• Take your time and keep it manageable

• Link your plan to your company’s strategy

• Justify your initiative and get buy-in and support

• Don’t re-invent, rebuild

• Go slow, manage change

• Set aside time from your operational responsibilities to make it happen

Without a Strategic Plan, you and your team won’t be effective and you won’t be able to get results, get attention and get ahead.

Why you need an IT Strategy:

Redirect from tasks to opportunities and result

• Switch from fighting fires to preventing fires

• Reduce risk with planning and a longer view

Most Strategic Plans never get written or they fail because they are too involved and complex. Keep them simple and use these three basic steps as your core approach. Ask yourself these questions:

1. Why do you need to do it? What is your goal?

2. What are the things you need to get done to achieve your goal?

3. How can you make those things happen?

By following the 3 steps above and writing them down, you will have the outline of your Strategic IT Plan. Then, you establish the tactical things that will help you implement your plan.

Implementation Plan

Once you have established your strategic plan using the 3-step process, you need to develop your implementation plan. This includes getting approval and resources as well as the steps you need to take to achieve your strategic objective.

1. Set the objective for each step

2. Analyze internal/external factors

3. Develop solutions

4. Identify and eliminate barriers

5. Allocate resources (people, time, money)

6. Develop detailed tasks

7. Implement your plan!

Step Implementation

What Are The Roadblocks?

How Can You Overcome The Roadblocks?

What Resources Do You Need?

What Are The Timelines?

What Are The Main Steps To Implement Your Plan?

Two Article Summaries

Directions
Refer back to Chapter 2 for how to critically read research articles. In this assignment, you will begin to review the articles you found last week and provide a summary of four articles that are useful for your emerging research idea. The articles must be research studies where data was collected. Theory pieces are fine for your paper, but not for this assignment.

Please use this worksheet to help you organize your summaries.
Please provide all four articles as attached PDFs.
Please note, that while you are only required to submit summaries of four articles, you are responsible for having read at least 10 empirical resources that will be cited in your final research proposal. You may use this worksheet template for other articles to help you get your ideas organized.

Micro-level

Why did the Hawthorne studies and McGregor’s Theory X and Theory Y have an impact on the study of organizational behavior?
Explain why and how changes in the U.S. demographics affect the healthcare industry.
How does attribution theory allow managers to “justify” workers’ behaviors?
What tools and/or techniques could a manager used to ensure that the message communicated is understood by the receiver as intended.

Total Rewards System Proposal

Total Rewards System Proposal
This research-based assignment focuses on the latest available information about creating, organizing, and managing a total rewards program. Envision a service-based (insurance, telemarketing, or other) profit organization that employs 20,000 employees in 17 different countries (AT&T). There are 2,000 management-level individuals who speak a variety of languages. The company employs diverse individuals who are governed by multiple regulatory environments.

Write an eight to ten (8-10) page paper in which you:

1. Create a brief overview of the company requirements for a total rewards system.

2. Formulate a total rewards strategy to encompass the fundamentals of compensation and the regulatory environments.

3. Explain the advantages of the total rewards strategy you are proposing and how it might satisfy the employees’ needs.

4. Determine the key communication components of the total rewards system.

5. Indicate your strategy for devising a competitive pay structure.

6. Use at least five (5) quality academic resources in this assignment

Evidence Base

Sampling

The most common sampling method is the convenience sample; therefore, many of the studies that you find for evidence use this sampling method. What are the implications of using a convenience sample on the way that you interpret and use the findings?

This unit begins the examination of the implementation of the research process, starting with sampling. Before answering this discussion question, be sure to read in the textbook about the various sampling methods and how each fit with research designs. Consider how the use of a convenience sample may affect the validity of the results of the study.

APA format in-text citations and two references. One full-page excluding cover and reference pages.

Required Textbook

Houser, J. (2018). Nursing research: Reading, using and creating evidence (4th ed.). Burlington, MA: Jones & Bartlett Learning

Required Reading Assignments: Chapters 3 (pg. 49-79); 7 (pg. 157-188)

4 – Assignment And Discussion

Approaches to physical security (APS) is embedded with measurable technique to protect buildings, property, assets and resources against intruders. Effective execution of physical security approach in private and public organizations and facilities involves multiple levels of protection such as outer perimeter, inner perimeter, and interior of the facility.

Scenario

* Dr. Armbruster, a pediatrician signed a lease agreement to establish his clinic in the heart of the city of Saint Louis, Missouri. He is very concerned about the security of the facility. You have been retained a physical security analyst, which of these security perimeters will you consider suitable for Dr. Armbruster’s new clinic.

Outer Perimeter Security
The outer perimeter often controls persons who walk and drive of the grounds of the facility. Do not forget that outer perimeter security includes high-security fence, high-security doors, high-security windows, high-security gate and remotely operated garaged.

OR

Natural Access Control
Natural access control utilizes the building and landscaping features to guide people entering and exiting the property, lessened perpetrator’s unnoticed access into the facility. Natural access control often measures interfere, and lowered sense of risk preventing intruders’ willingness to come closer to the property.

Discussion 450 to 500 words:

APA Format, need References

Physical security (PS) is categorized as imperative for public and private organizations to protect and defend their assets, data, resources, personnel, facility and infrastructures.

Scenario

To what extent are there significant differences between Minimum security system (MSS-1) designated to obstruct unauthorized external traffic into the system and tends to interface with basic physical security operations like doors and windows and regular locks.
AND

High-level security system (HLSS) Minimum security system (MSS-1) developing to obstruct unauthorized external traffic into the system and tends to interface with basic physical security operations like doors and windows and regular locks.
You have been retained as a registrar of a college, which of these security apparatuses will you implement around your unit; if so why?