BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

Do you require help with your paper? Use our custom writing service to achieve better grades and meet your deadlines. Trust our team of writing experts with your work today, and enjoy peace of mind.


Order a Similar Paper Order a Different Paper

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

Unit 1

 

Top of Form

Bottom of Form

  • PRINT
  • IT, IT Governance, and Business Process Excellence

INTRODUCTION

IT is any computer-based tool that people use to work with information and to support the information and processing needs of an organization. It consists of the hardware and software a firm uses to achieve its business goals. In practice, information technology (IT) is used interchangeably with the term Information Systems (IS). Theoretically, IS can be best understood from both technology and business perspectives. It includes people and an organizational dimension in addition to the technology aspects. An information system provides solutions to business problems. IS can be defined as a collection of interrelated components that collect, process, store, and disseminate information to support, coordinate, and control an organization.

TOGGLE DRAWERHIDE FULL INTRODUCTION

IT governance is a process of structuring, operating, and controlling IT assets and activities to support the organization, to transform the organization to achieve its strategic goals, to serve the interests of stakeholders, and to meet regulatory and legal obligations.

IT is an enabler of business processes in an organization, including the execution of process, capture and storage of process data, and monitoring the process performance. Good IT governance ensures business process excellence.

In this unit, we discuss how project level governance guides organizations through implementation to achieve process excellence and transform them from local to global enterprises. Issues addressed include organizational learning, engaging stakeholders in system delivery and implementation, conflicting stakeholder interests, making change to address global issues, and organization transformation.

LEARNING ACTIVITIES

Collapse All

[u01s1] Unit 1 Study 1

Studies

Readings

Read the following Harvard Business School Publishing case study:

[u01a1] Unit 1 Assignment 1

Stakeholders in IT Implementation

According to the study conducted by Weill and Ross (2009), enterprises that focus on operational excellence have larger increases in asset utilization. Organizations that have achieved process excellence are process driven. They design and standardize enterprise processes to minimize coordination costs. A business process could be defined as an ongoing collection of related activities that create a product or service of value to the organization, its customers, and business partners. Every process has inputs and outputs, and many processes cross functional areas in an organization. For instance, the procurement process involves coordination among warehouse, purchasing, and accounting—three functional areas of an organization.

For this assignment, you will need to propose a change to a business process in an organization and analyze the impacts to stakeholders. Address the following in your paper:

  • Identify a small or large business process in your organization (or an organization that you have worked for previously) that could be improved through IT.
  • Describe how you would use IT to improve the process.
  • Analyze the benefits of the IT change to your organization.
  • Identify the stakeholders of the business process.
  • Describe the requirements for each stakeholder involved with the process change.
  • Analyze the impact of the IT implementation on each stakeholder. Consider intended and unintended consequences.

Your paper should be 1000 words. Be sure to use appropriate APA formatted citations and references if you use any of the unit readings for support in your paper.

Resources

[u01d1] Unit 1 Discussion 1

Research Article Analysis

Answer this discussion based on your residency course 2 status:

  • If you have not yet taken residency course track 1 or 2, follow Discussion Option A.
  • If you have already taken residency course track 2, follow Discussion Option B.

Discussion Option A

Answer each of the following:

  • Seek out and identify an interesting research article (not a literature review) relevant to this class published within the last 5 years in a peer-reviewed journal. Assume the persona of a learner like you at Capella who is proposing a dissertation project. Determine whether the research article you identified describes a quantitative or a qualitative study. Select the corresponding Research Plan template (quantitative or qualitative) from the Resources. Fill out section 1 of the abbreviated Research Plan template, drawing from your chosen article, as though you were responding to the template in real life, proposing original research. Provide any necessary references and citations. Address the following question in relation to the article you chose: Are the research topic, research problem, and research question(s) properly aligned? That is, are concepts that appear in the research problem refinements of those that appear in the research topic; are concepts that appear in the research question(s) refinements of those that appear in the research problem?​
  • Fill out section 2 of the abbreviated Research Plan template (see Resources) using the same article you used for Part 1. Provide any necessary references and citations. Address the following question in relation to the article you chose: How does the author of the article justify the use of the research method chosen in addressing the research question in 2.2?

Discussion Option B

Answer each of the following:

  • Seek out and identify an interesting research article (not a literature review) relevant to this class published within the last 5 years in a peer-reviewed journal. Assume the persona of a learner like you at Capella who is proposing a dissertation project. Determine whether the research article you identified describes a quantitative or a qualitative study. Select the corresponding Research Plan template (quantitative or qualitative) from the Resources. Fill out section 3 of the abbreviated Research Plan template, drawing from your chosen article, as though you were responding to the template in real life. Respond to the following: Is the research methodology described in the RP section 4 clear enough that an experienced researcher could possibly duplicate the research?
  • Fill out section 4 of the abbreviated Research Plan template (see Resources). Provide any necessary references and citations. Discuss any challenges that the author of the article might experience during data collection. What obstacles might occur in the field?

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 2

 

Top of Form

Bottom of Form

  • PRINT
  • Managing IT Service Delivery

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

INTRODUCTION

Before the emergence of public Internet, companies used proprietary technology to build their own network infrastructure and information systems. The infrastructure building was expensive for companies with multiple locations. Communications to customers and business partners through the network proved to be difficult if different proprietary technologies were used by business partners. The performance was unsatisfactory to many business managers.

TOGGLE DRAWERHIDE FULL INTRODUCTION

The emergence of open standard public Internet has changed the way a company delivers its IT services. Services that used to be delivered by the IT department can now be acquired from outside IT service providers. This is outsourcing.

With the availability of reliable, high-capacity, high speed networks, software is designed to run in the distant facilities of service providers who also provide similar services to other customers. These services of on-demand computing environments include applications, managed access to network resources, servers, and storage. For instance, the computing portfolio of IBM includes server farms, storage forms, network resources, server virtualization and app provisioning, storage management, network management, systems management, and higher level Web services apps.

Managing IT service has shifted to include managing relationships with service providers, managing risk through incremental outsourcing, managing large scale outsourcing arrangements, and so on.

IT governance process ensures the effectiveness of IT services through specifying roles, structures, and methods of managing IT services. Mechanisms such as charge-backs and transparent policies can help business units understand the cost of IT services.

LEARNING ACTIVITIES

Collapse All

[u02s1] Unit 2 Study 1

Studies

Readings

Use the Capella library to read the following:

[u02a1] Unit 2 Assignment 1

Project Topic Ideas

For this assignment, you will brainstorm possible ideas for your course project topic. First, review the Implementing IT Governance course project description to get an overview of your course project. Then, review the topics and content in each unit of the course to help you identify potential project topics. Submit the following to your instructor for this assignment:

  1. Create a list of possible ideas for your course project and briefly describe each idea.
  2. Indicate which idea is your first choice and describe the reasons that you chose that topic.

Your assignment should be one page or less. Your instructor will provide you feedback as to the scope of your chosen topic before you complete the next assignment for your project. Review the Project Topic Ideas Scoring Guide to be sure that you have addressed the assignment criteria.

Resources

[u02d1] Unit 2 Discussion 1

IT Capability

Using the Wang et al. (2008) article and the Willcocks et al. (2006) article, discuss the IT capability of your organization (or one that you are familiar with) in regard to two of the nine capabilities addressed by the Feeny-Willcocks framework to assess the readiness for higher rewards from outsourcing.

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider providing your coursemates with your evaluation of the readiness of each organization for outsourcing, providing a rationale for each.

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

Unit 3

 

Top of Form

Bottom of Form

  • PRINT
  • Governing IT Project Delivery

INTRODUCTION

The formulation of business strategies ends with cascading objectives and tasks assigned to low levels of an organization. Implementation of the objectives and tasks frequently means projects.

A project is a complex, unique, one-time effort or activity limited by time, resources, budget, and performance specifications designed to meet customer needs. Project management is the management of the work to develop and implement a project, and includes defining, planning, execution, and delivery of a project. The goal of project management is to deliver an IT project on time, on budget, and within user specifications to support the organization’s strategies.

TOGGLE DRAWERHIDE FULL INTRODUCTION

IT governance needs to pay attention to the following project areas in order to ensure an effective project delivery: resource allocation; organization structure and culture for assignment of authority; responsibility and evaluation of performance; and planning and controlling IT systems to ensure strategies are effectively performed.

There are benefits and risks in every IT project. These risk factors include budget, project duration, staffing, requirement changes, and inexperience with newer technology. The use of new development method and management control processes can reduce these risks.

Good IT governance can help to reduce risks by enforcing control processes and necessary technical and architectural standards in the project implementation process. At the same time, it is important to allow flexibility for better results.

IT governance allocates decision rights and accountabilities within IT and within business units to ensure that projects are conforming to the architecture standard, meeting the goals of business, and are delivered in a cost effective manner.

Adaptive Methodologies

Adaptive methodology is a rapid, iterative development method. It calls for an implementation that occurs incrementally, emphasizes early delivery, and requires adjustment during deployment.

This unit covers change management, the adaptive method, and dips during project implementation.

LEARNING ACTIVITIES

Collapse All

[u03s1] Unit 3 Study 1

Studies

Readings

Use the Capella library to read the following:

[u03a1] Unit 3 Assignment 1

Change Management Strategies

To get user acceptance of IT projects, it is important that every business have a well-constructed change management plan. Without user acceptance, your business operations, processes, and ROI will suffer. For the business process identified in the Unit 1 assignment, analyze the potential resistance from stakeholders and develop a change management plan to improve stakeholder acceptance level of the IT project. Your plan should include: communication channels, employee trainings, and your plan for involving stakeholders.

  • Analyze the potential resistance from stakeholders for a change in business process using IT.
  • Evaluate Kotter’s (2007) change management theory and its applicability to a business change management plan.
  • Develop a change management plan to improve stakeholder acceptance level of the IT project, supported by relevant change management theories. Your change management plan should include:
    • A communication plan.
    • An employee training plan.
    • A process for involving stakeholders in the decision-making process.

Your paper should be 1500–2000 words long and include a minimum of five resources. Include at least two scholarly resources that you locate through your own research, in addition to the course readings, to support your perspective. Review the Change Management Strategies Scoring Guide to be sure that you have addressed each grading criterion of this assignment.

Resources

[u03d1] Unit 3 Discussion 1

Change Management Plans

The Long and Spurlock (2008) article explored the dynamics of change management and successful implementation of an IT project. IT projects driven by a re-engineering process will change basic work processes and are frequently met with resistance. However, resistance can be overcome by a carefully designed change management plan that includes the involvement of stakeholders in the project, clear communication plans, and a training program with a high level of employee satisfaction. Involving stakeholders in a project implementation can create buy-in and support of a project.

For this discussion, address the following regarding the article:

  • Analyze the process developed to involve stakeholders in the ERA project.
  • Analyze the benefits of involving stakeholders in the ERA project.
  • Analyze the ways in which the change management plan helped to improve stakeholder acceptance level of the project.

You do not need to analyze the above questions in-depth. Your discussion should still be a standard length; approximately 250–400 words.

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider also providing your analysis on the effectiveness of the change management plan overall. What are its strengths and weaknesses? How would you improve it or what would you change, and why?

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 4

 

Top of Form

Bottom of Form

  • PRINT
  • IT as Enabler of Corporate Compliance

INTRODUCTION

There are an increasing number of regulations that corporations need to comply with including regulations for information protection, data retention, financial accountability, disaster recovery, and financial risk management.

With pervasive use of IT in business processes today, it is efficient and systematical to use IT to help comply with the requirements of laws. In terms of data retention, the laws include: Sarbanes-Oxley Act of 2002, SeC Regulation 240.17-a, Health Insurance Portability and Accountability Act, U.S.A. Patriot Act, Anti-Terrorism, Crime and Security Act of 2001, and Basel II.

LEARNING ACTIVITIES

Collapse All

[u04s1] Unit 4 Study 1

Studies

Readings

Use the Capella library and the Internet to read the following:

Review the links below if you are unfamiliar with IT related laws and regulations and need background information. The four links address the first four laws mentioned in the unit introduction: Sarbanes-Oxley Act of 2002, SEC Regulation 240.17-a, Health Insurance Portability and Accountability Act, and the U.S.A. Patriot Act. If you’d like additional background information on other laws related to IT governance such as Anti-Terrorism, Crime and Security Act of 2001, Basel II, et cetera, feel free to do additional research.

[u04a1] Unit 4 Assignment 1

Project Proposal

For this assignment, create a proposal for your course project topic. Your proposal should be brief, but should enable the instructor to assess your topic’s appropriateness. In order to complete this assignment, you are expected to locate a few scholarly articles on your topic. These articles will also help you complete the course project outline and reference list in Unit 6. Include the following components in this assignment:

  1. Describe your chosen topic. Be sure to include a rationale for why you have chosen this topic, if you have changed your topic since your Unit 2 assignment.
  2. Describe why this topic is important in an organization.
  3. Describe the current development, issues, and challenges on the topic.

Your proposal should be approximately one page. Be sure to appropriately cite and reference any articles that you use to support your proposal, using proper APA format. You may also want to start using RefWorks as you locate and save relevant resources from the Capella Library. You can use these resources to help you complete your reference list, which is due in Unit 6. If you are unfamiliar with RefWorks, use the link provided in resources to set up your account and view some helpful tutorials.

Review the Project Proposal Scoring Guide to be sure that you have addressed the grading criteria.

Resources

[u04d1] Unit 4 Discussion 1

Compliance with Regulatory Requirements

According to Ragan’s article, it is important to develop a process to keep the organization in compliance with laws and regulations. Discuss the IT policies and processes or procedures that your organization (or your previous workplace) uses for compliance with regulatory requirements. Do you think these are working effectively? If not, how would you improve them?

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider the ways in which the IT policies and processes may conflict with the organization’s internal organizational requirements, if at all. How would you ensure that these processes and policies align with the business’ goals?

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 5

 

Top of Form

Bottom of Form

  • PRINT
  • Managing IT Security

INTRODUCTION

One of the most important responsibilities of the management of an organization is to assure the security and quality of its IT enabled business activities. Security policies can ensure the accuracy, integrity, and safety of the data and resources. IT security is a management issue as well as a technology issue. The most advanced security technology will not protect the information resources of an organization until the security policy is known and followed by every employee.

TOGGLE DRAWERHIDE FULL INTRODUCTION

Security policy and technology is central to governance efforts. These may include: determining the appropriate level of security, establishing policy for making security decisions, establishing policy for educating users and deploying multilevel technical measures, and establishing policy for incident response procedures.

This unit covers crisis management, security management frameworks, and disaster recovery.

LEARNING ACTIVITIES

Collapse All

[u05s1] Unit 5 Study 1

Studies

Readings

Use the ACM Digital Library to read the following:

  • Sheldon, F. T., Abercrombie, R. K., & Mili, A. (2008). Evaluating security controls based on key performance indicators and stakeholder missionProceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research(pp. 1–4).
    • This article has proposed a framework to evaluate security control impacts on stakeholders. The first matrix (Table 1. Stakes (ST) Matrix) shows the Mean Failure Cost (MFC) to various stakeholders (first column) due to lack of various security requirements (first row). The cost includes loss of productivity, loss of data, and loss of business as a result of security violation.

Read the following Harvard Business School Publishing case study:

  • Haggerty, N. R. D., & Ramasastry, C. S. (2008). Security breach at TJX [PDF]. Richard Ivey School of Business.
    • This case describes the data breach that was discovered in December of 2006 at TJX, an off-price apparel and home fashion retailer. The unauthorized intrusion into the computer systems that process and store customer transaction information caused $170 million in expenses between 2006 and 2009. It is estimated that 94 million Visa and MasterCard accounts were compromised, with a loss of billions of dollars. The case examines the intersection of technology, management, and employee issues.
  • Toggle Drawer

[u05s2] Unit 5 Study 2

Project Work

For this study, continue locating articles in the Capella Library that are applicable to your course project topic. You began work on this in the previous unit and you will complete your research in Unit 6. You are expected to include a total of 10–15 resources, so you may want to locate a few in this unit to spread out your research work.

Resources

[u05a1] Unit 5 Assignment 1

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

 

TJX Case Analysis

IT security is important for every organization because breaches of computer security can be costly. Research has revealed that security breaches may cost individuals and industry billions of dollars per year due to their impact on worker productivity, customer services, and so on. The management of organization security must balance the essential need for security and the critical need for business continuity and productivity.

For this assignment, analyze the people, work process, and technology failure points in TJX’s security. Consider how IT security can be improved and strengthened for each of those three areas. Address the following aspects in your paper:

  • Describe the failure points of the top management, middle management, and the user role at TJX.
  • Analyze the role of TJX top management in funding and governing IT security.
  • Analyze the role of TJX IT management in IT security, policy development, information security, and data and access security.
  • Analyze the responsibilities of the user group in the TJX case.
  • Describe the weaknesses in the work process that impacted IT security in the TJX case.
  • Analyze the role of technology in the TJX security breach.
  • Recommend improvements and changes to TJX’s work process and IT security.

Your paper should be 1000–1500 words long, using a minimum of two scholarly resources from your own research, in addition to your course readings. Be sure to use appropriate APA formatted citations and references to support your perspectives throughout your paper. Review the TJX Case Analysis Scoring Guide to be sure that you have addressed all of the grading criteria.

Resources

[u05d1] Unit 5 Discussion 1

Evaluating Security Control Impacts

The Sheldon et al. (2008) article proposes a framework for evaluating security control impacts on stakeholders in an organization. Do you think this framework is feasible in your organization (or the organization with which you are most familiar)? Why and why not? Choose a security requirement in your organization and discuss its impact on various stakeholders.

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider reviewing the impacts and feasibility presented by your colleagues and provide each with further feedback as to what he or she may have overlooked or the unintended consequences of either, that may have been missed.

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 6

 

Top of Form

Bottom of Form

  • PRINT
  • Risk Management

INTRODUCTION

Risk management is central to IT governance. IT governance policy that cascades down to the project level, should guide the effort of identifying various sources of risks including those involved in IT investment portfolio, IT projects, and service delivery. IT governance can determine the risk tolerance level and develop processes to monitor and measure different types of risks.

TOGGLE DRAWERHIDE FULL INTRODUCTION

Risk management is also essential to project success. The underlying goal of every step in project management is to prevent something bad from happening. Project selection systems try to reduce the likelihood that projects will not contribute to the mission of the firm. Teambuilding reduces the likelihood of dysfunctional conflict and breakdowns in coordination.

Risk management is proactive, not reactive. It is a preventive process to reduce the number of surprises, and leads to a better understanding of the most likely outcomes of negative events. Risk assessment and contingency plans increase the chance that a project can be completed on time and within budget.

This unit covers IT crisis management, IT risk management, and disaster recovery planning.

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

LEARNING ACTIVITIES

Collapse All

[u06s1] Unit 6 Study 1

Studies

Readings

Use the Capella University Library to read the following:

  • Clark, P. (2010, October). Contingency planning and strategies.Proceedings of the Information Security Curriculum Development Conference, 131–140.
    • This article proposes a framework for creating a contingency plan. The plan includes business impact analysis, incident response plan, disaster recovery plan, and a business continuity plan. The authors argued that a good contingency plan can save a company from bankruptcy after an incident or disaster.
  • Shi, Y. (2007). Today’s solution and tomorrow’s problem: The business process outsourcing risk management puzzle.California Management Review, 49(3), 27–44.
    • The Shi article provides a comprehensive view of the different types of risks that a business process outsourcing client faces, including the puzzle of balancing short term benefits and the organization’s long term performance and strategic goals. The short term performance risk includes higher operation costs, increased customer complaints, lower service quality, and operation shutdown. The long term performance risks include price and contract creep, low rate of innovation, operational dependency, loss of strategic assets or control over strategic assets, process-level lock-in, and adoption of disadvantageous architectural style. The article proposes a framework to solve the risk management puzzle.
  • Toggle Drawer

[u06a1] Unit 6 Assignment 1

Project Outline and References

For this assignment, locate 10–15 scholarly articles on your project topic and complete your project outline and reference list. You should use the articles that you located for your project proposal to help you partially fulfill this requirement.

Follow these instructions to complete this assignment:

  1. Outline and organize the main points of your project.
  2. Explain each main point of your project, providing enough supporting details so that the topics, logic, and organization are discernible and understandable.
  3. Create a reference list of 10–15 scholarly sources that support the main points of the project.

Your paper should be 1000–1500 words, including your reference list. Use the resources provided to help you complete this assignment. This is a good opportunity to practice proper APA format for your references. Remember that you can use an application like RefWorks to help you track and properly format your sources. As a doctoral learner, RefWorks (or a similar application) can be an invaluable tool. Review the Project Outline and References Scoring Guide to be sure that you address the grading criteria of the assignment.

Note: An Annotated Bibliography is not a requirement of this assignment, but you may want to complete one to help you organize your thoughts on each resource, and in order to help you complete your upcoming draft and final for your course project.

Resources

[u06d1] Unit 6 Discussion 1

Contingency Plans

Does your company (or one that you are familiar with) have a similar plan to the one described in the Clark (2010) article? What parts are included in the plan? Evaluate your company’s contingency plan according to Clark’s framework.

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider sharing your evaluation of Clark’s contingency plan framework itself.

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 7

 

  • PRINT

·        Globalization and Culture Issues

INTRODUCTION

Information technology is an enabler of globalization. Globalization is the integration of economic, cultural, and social aspects of life. The Internet and global communications have reduced the economic and cultural advantages of developed countries. According to Friedman, the drivers of globalization include the fall of the Berlin Wall, Netscape, development of workflow software, uploading, outsourcing, offshoring, supply chaining, insourcing, informing, and steroids that consist of computing, instant messaging, file sharing, wireless technologies, VoIP, videoconferencing, and computer graphics. Globalization presents organizations with both challenges and opportunities.

The international dimension of managing global IT includes dealing with political, cultural, and geo-economic challenges posed by various countries. IT governance should develop a set of transnational strategies to integrate global IT activities through global IT platforms and establish policies to address global data access and system development.

This unit covers transborder data flows, the global IT platform, and multicultural environments.

Reference

Friedman, T. (2005). The world is flat: A brief history of the twenty-first century. Farrar, Straus, & Giroux.

LEARNING ACTIVITIES

Collapse All

[u07s1] Unit 7 Study 1

Studies

Readings

Use the Capella library to read the following:

Resources

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

[u07a1] Unit 7 Assignment 1

Project Draft

For this assignment, complete a preliminary draft of your course project. The draft should include all the major narrative elements of your intended work, even if some of them require further development. Your instructor will provide feedback on your draft, which you can use to make improvements prior to submitting your final project paper in Unit 9.

The format that your paper takes is up to you, as determined by your project outline, but your draft should demonstrate the following criteria:

  • Critically analyze and evaluate concepts, theories, and scholarly literature on implementing IT governance.
  • Analyze the current development and trends on an IT governance implementation topic.
  • Analyze the current challenges and issues associated with a topic on implementing IT governance.
  • Assess solutions and limitations regarding a topic on implementing IT governance.
  • Assess future development and potential research directions for a topic on implementing IT governance.

Your draft should be approximately 4,000 words long, in addition to your reference list. Your final project paper, which is due in Unit 9, will need to be 5500–6000 words long. Take advantage of the Writing Support resources to help you improve your writing. Review the Project Draft Scoring Guide to be sure that you have addressed all of the grading criteria. Ensure that the paper is organized in a hierarchical manner consistent with APA guidelines on elements, format, and organization. References and citations also must be consistent with APA guidelines.

Resources

[u07d1] Unit 7 Discussion 1

Culture Impact on Global IT Structure

Sia, Soh, and Weil (2010) and Ifinedo (2009) present different, somewhat oppositional perspectives on global IT management. Sia, Soh, and Weill support the consideration of local and cultural factors in a global IT structure. Ifinedo (2009) argues that the four dimensions of national culture (power distance, individualism, masculinity, and uncertainty avoidance) do not make statistically significant differences on the perceptions of IT security concern across the Global Financial Service Industry (GFSI). From your experience, which perspective do you support and why? Explain your reasons and support your perspective with appropriate APA formatted citations and references.

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider suggesting an example culture where you think your classmate’s choice may or may not apply well and support your perspective.

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 8

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

Top of Form

Bottom of Form

  • PRINT
  • Ethical Issues

INTRODUCTION

Ethics are the principles of right and wrong that individuals use to conduct themselves in the world. Many organizations develop their own code of ethics, which acts as a set of principles intended to guide decision making in the organization. Many ethical codes include common principles such as responsibility, accountability, and liability.

TOGGLE DRAWERHIDE FULL INTRODUCTION

The extensive use of IT applications has created a variety of ethical issues including privacy, accuracy, property, and accessibility issues. These are closely related to the standards of right and wrong in information processing practices.

With expansion in the global market, many organizations encounter inconsistent privacy and security laws. There are over 50 countries that have data-protection laws. The laws of one country may conflict with those of other countries.

Without uniform standards for privacy and security, the transborder data flows of information between countries are often challenging or obstructed.

LEARNING ACTIVITIES

Collapse All

[u08s1] Unit 8 Study 1

Studies

Readings

Use the Capella library to read the following:

  • Wright, D. (2011). A framework for the ethical impact assessment of information technologyEthics & Information Technology, 13(3), 199–226.
    • The author proposes a framework for IT managers, developers, and programmers to use to assess the ethical impact of the IT project on stakeholders. To use IT in an ethical manner, it is important for an organization to engage stakeholders and assess the ethical impact on them before or at the early stage of an IT development. Ethical principles include respect for autonomy, dignity, informed consent, and so on. The article also describes an application launched by Google that had unintended impact on users.
  • Desai, M. S., & von der Embse, T. J. (2008). Managing electronic information: An ethics perspectiveInformation Management & Computer Security, 16(1), 20–27.
    • This article argued that ethical frameworks should be implemented in all electronic information (EI) activities and processes. They start the process by deciding what data to collect, the method to collect data, how data is processed, how the data is used after process, and impacts on stakeholders.
  • Toggle Drawer

[u08a1] Unit 8 Assignment 1

Ethical Framework Implementation

For this assignment, you will evaluate how IT policies and processes can support an organization’s ethical practices. To do this, identify the ethical framework from the Wright (2011) article, and describe how you would implement it in your current or previous employer’s organization, using the implementation strategies discussed in the Desai and von der Embse (2008) article.

To complete this assignment, address the following aspects in your paper:

  • Describe the current culture in two different functional units in your chosen organization. If your organization is global, be sure to consider intercultural factors as well as organizational culture.
  • Apply Wright’s ethical framework to each functional unit, accommodating for the differences in business culture and business process requirements. Include a rationale for your choices and explanations.
  • Predict potential differing viewpoints and reactions from implementing the ethical framework for members of the two functional units in an organization.
  • Describe the implementation strategy for each functional unit, considering the differing cultural needs.

Your paper should be double-spaced, approximately 1,000 words, and include three academic resources. (You may use the Wright article and the Desai and von der Embse article as two of your sources.) Be sure to use appropriate APA format in your paper, including in-text citations and a reference list for resources referenced in your paper.

 

Resources

[u08d1] Unit 8 Discussion 1

Ethical Principles

Discuss an application or IT policy that is used at your current or previous employer that would be considered a violation of ethical principles as discussed in the Wright (2011) article. What are the unintended impacts on stakeholders in the organization?

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider proposing an approach to integrate an ethical framework into your chosen IT policy. What factors need to be considered?

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 9

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

Top of Form

Bottom of Form

  • PRINT
  • Mechanisms to Implement IT Governance

INTRODUCTION

After IT governance allocates decision rights and accountability to ensure IT policy and processes are aligned with the corporate strategies, a set of procedures and mechanisms are needed to cascade strategic goals down into the organization and to facilitate the implementation of these goals. These mechanisms and procedures for the implementation of IT governance include decision making structures, alignment processes, and communication approaches.

LEARNING ACTIVITIES

Collapse All

[u09s1] Unit 9 Study 1

Studies

Readings

Read the following Harvard Business School Publishing case study:

[u09a1] Unit 9 Assignment 1

Project: Implementing IT Governance Final

Your final project paper is due by the end of this week. Integrate the feedback that you received from your instructor, expand your paper to meet the 5500-word minimum, and in addition, add a title page, abstract, and reference list. Your abstract should describe the paper’s purpose, considerations, issues, and conclusion.

Review the Implementing IT Governance course project description to be sure that you have fully addressed the grading criteria of this assignment. In addition, be sure to take advantage of the Writing Support resources to help improve your writing. Ensure that the paper is organized in a hierarchical manner consistent with APA guidelines on elements, format, and organization. References and citations also must be consistent with APA guidelines.

Resources

[u09d1] Unit 9 Discussion 1

IT Governance Archetypes

For IT decisions on business application needs, which of the following framework archetypes are used in your organization (or an organization with which you are familiar): Business Monarchy, IT Monarchy, Feudal, Federal, or Duopoly? Analyze the strengths and weaknesses of the decision structure.

Response Guidelines

Respond substantively to at least two of your coursemates, sharing your insights and experiences. Consider proposing a different archetype for your own or your classmates’ organizations and provide a rationale for your choice.

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

Unit 10

 

Top of Form

Bottom of Form

  • PRINT
  • IT Leadership

INTRODUCTION

In many companies, IT is a foundation for conducting business. IT supports, sustains, transforms, and grows the business by achieving operation excellence, developing and delivering new products and services, improving decision making, maintaining customer and supplier intimacy, achieving competitive advantage, and sustaining day to day operations. This has made IT leadership a critical issue in an organization. It is important to know what kind of leadership is appropriate.

LEARNING ACTIVITIES

Collapse All

[u10s1] Unit 10 Study 1

Studies

Readings

Read the following Harvard Business School Publishing case studies:

[u10a1] Unit 10 Assignment 1

Transforming IT Management

In the article on the Alcan Case–Part A (2009), which you read in the unit studies, Dube, Bernier, and Roy present the state of IT management at Alcan in 2006, as assessed by the soon-to-be CIO, Robert Ouellette. For this assignment, assume the CIO’s position and propose a new strategic plan for IT management based on your analysis of the case.

Review Weill and Ross’s 2008 article, “Mechanisms for Implementing IT Governance,” page 27, for an example of a Governance Arrangements Matrix used for Carlson Companies, and pages 2–13 for explanations of the five governance archetypes. Also, review Weill and Ross’s 2009 article, “Allocating Decision Rights and Accountability: Elements of Effective IT Governance,” pages 3–4, for brief explanations of the five different types of IT decisions.

Include the following aspects in your paper:

  • Discuss the strengths and challenges of the IT management model used at Alcan in March 2006.
  • Design a new IT governance framework using all five IT decisions types from the Weill and Ross (2008) Governance Arrangements Matrix to address the IT management issues and challenges presented in the case.
  • Analyze the benefits of your newly proposed model.
  • Analyze how the new IT governance model would solve or reduce the scale of the current problems at Alcan.
  • Discuss the leadership principles needed to implement the new model successfully and explain why each is needed.

Your paper should be approximately 1000–1500 words long. You do not need to include additional research in your paper, other than the case and the Weill and Ross articles. Be sure to cite and reference any articles appropriately, using APA format, whenever you reference them.

Resources

[u10d1] Unit 10 Discussion 1

Course Reflection

Now that you have come to the end of the course, take a moment to reflect on what you have learned and how you will apply that knowledge in your professional life. Answer the following questions in your discussion post:

  • What are the major areas of learning or understanding that you acquired in this course that you did not have previously?
  • How do you see yourself applying the concepts in this course to your professional work life?
  • What would you like to learn about further, in relation to the topics in this course?

You may also want to use the BMGT8214 Course Alignment Map to review the assignments, course competencies, and specialization outcomes, as you reflect on your learning in this course.

Response Guidelines

You are not required to respond to your classmates for this discussion, but you may if you would like to.

Resources

Updates and Handouts

Periodically, information will be posted in this space for the good of the class.

Ask Your Instructor

This forum was created to provide a convenient space for you to ask questions—questions about particular assignment and discussion activities, questions about the course in general, questions about expectations. If there is something that you feel you could use help with, please post your question here. Most likely, some of your classmates will have the same concern, so your post may help several learners. If you feel your question is private, please use the Messages tool found under Notifications.

BMGT8214 Guiding Implications of IT Policies | Discussions & Assignments | Writing Help for Busy Students

Writerbay.net

Our writing experts are ready and waiting to assist with any writing project you may have. From simple essays, research papers, lab reports, and dissertations, to online classes, you can be sure we have a service that perfectly matches your needs.


Order a Similar Paper Order a Different Paper