Develop a service contract for an organization

Assignment Help Computer Engineering
Reference no: EM133482119

QUESTION 1

Study Chapter 2: ITSM: The Business Asset (Taylor, S. (2012). Service Intelligence - Improving your bottom line with the power of IT Service management. Prentice Hall.)

In Chapter 2 ITSM: The Business Asset, Taylor (2012) indicates that there are many ways to articulate an IT strategy, and outlines the key areas to check for in an IT strategy. The main areas to check for in an IT strategy are outlined in "What to look for in an IT strategy" by Taylor (2012:28).

Answer the following question:
Analyze the IT Strategy DRAFT in the article: UCM ICT Strategy Paper (Draft Document) (UCM, 2013) and DISCUSS at least five key areas that are articulated and at least five key areas that are NOT articulate that you would look for in an ICT strategy. [Minimum TWO PAGES]

(You will be awarded up to 10 additional marks if you provide arguments that support your deliberations from at least four relevant sources such as journal articles)

QUESTION 2

Read the article:

o Pintaric, N. (2008). ICT Strategy of Universities. In Central European Conference on Information and Intelligent Systems (p. 1). Faculty of Organization and Informatics Varazdin.
o In addition, study: Chapter 2 and APPENDIX A (IT Strategy Template) (Taylor 2012:149 -156)

"The ICT strategy provides the link between the University strategy and the work of ICT through the creation of a decision space within which the management of the operational environment, identification of the future landscape and the roadmap of projects to move from the current to future landscape can be defined and executed successfully." (University of Lincoln, 2023)

Study the ICT Strategy

Answer the following questions:

(a) COMPARE The two ICT strategies: DRAFT UCM ICT Strategy versus University of Lincoln

ICT Strategy (20 marks)

(b) Consider the information that you gathered as you progressed with this assignment and the knowledge that you have acquired, and develop a NEW VERSION of the UCM ICT Strategy.

This version should be the final version that you could present to the ICT UCM Committee as an improved version. (30 marks)

SECTION B

In Chapter 5 - The Negotiation, Taylor (2012:81-94) outlines the 'terms of service' negotiated once the sourcing model has been selected. The basic information an organization should include in a service contract is covered in the service contract template (Taylor, 2012:157-163).

Chapter 5: The Negotiation, and APPENDIX B Service Contract Template (Taylor, 2012)
Study the concepts outlined by Taylor and the elements of the Service contract in APPENDIX B.

Answer the following question:

Adapt the template in Appendix B to develop a service contract for an organization/institution that currently outsources its ICT services.

Reference no: EM133482119

Questions Cloud

Creating the emergency preparations : What influence do you think nurses have in creating the emergency preparations, implementing various protocol.
How can learning increase the competitive advantage : Discuss how can learning increase the competitive advantage of South Africa telecommunication like Vodacom and MTN and Telkom
How it professional can attempt to estimate time and cost : Write about how IT professionals can attempt to estimate time and cost when we don't know the requirements yet.
What are five common reasons for systems projects : What are five common reasons for systems projects? What are some internal and external factors that affect systems projects?
Develop a service contract for an organization : Adapt the template in Appendix B to develop a service contract for an organization/institution that currently outsources its ICT services
Describe how the estimated variability in selling prices : Describe how the estimated variability in selling prices varies as the mean selling price varies from 100 thousand to 500 thousand dollars
Define business profiles, processes and modeling : Define business profiles, processes, and modeling. Explain the difference between vertical and horizontal systems packages.
What are some examples of form validation we would want : What are some examples of form validation we would want to do solely on the server? When might we do it only on the client?
Develop a strategy for backing up the company : What do you need to consider while deciding the best specifications for processor, memory, and disk space

Reviews

Write a Review

Computer Engineering Questions & Answers

  Brief synopsis of the system or website you experience

brief synopsis of the system or Website you experience(d), and explain why you believe this rule would improve it.

  Workplace communication a

Your major project is related to an on-line book/CD/DVD seller. Research a number of currently available website offerings. Keep links and notes related to the websites, as you will be required to write a brief report on your findings.

  Write a program that reads an integer value

Write a program that reads an integer value and prints the average of all odd integers between 0 and the input value, inclusive.

  Design an experiment to help them figure that out

A website wants to know whether a new layout will increase sales. Design an experiment to help them figure that out.

  Online procurement technologies

Identify and explain two major initiatives undertaken by Australian government (at federal/ state/local government level) in order to introduce the online procurement technologies.

  Compare characteristics of classic and modern cryptography

Compare and contrast the characteristics of classic and modern cryptography. (Maximum: Half a Page, double-spaced). References and in-text citations must.

  Create active directory policies to include features

Active Directory Design and Active Directory Implementation- This section will specify organizational Active Directory design, and develop and implement Active Directory as per organizational standards and policies

  Discuss which model you would use and why

First find a use case for time series analysis. Once you have identified an interesting use case, describe the use case, how time series analysis can be uses.

  Display how many bytes oldschoolstring actually requires

Calculates (so not a hard-coded value) and displays how many bytes oldschoolstring actually requires.

  Which processor has the highest performance in terms

Which processor has the highest performance in terms of instructions per second? If the processors individually require 10 seconds to execute a program

  Who is liable in the event of a security breach

Take for example the Windows 10 Operating System which proposed (and used) forced updates.What are the reasons for a user to not want forced updates?

  Identify and list all primary functional requirements

COIT 20248: Information Systems Analysis and Design - Identify and list all primary functional requirements for the system in the case study

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd