Fully perform five formal steps of case analysis methodology

Assignment Help Basic Computer Science
Reference no: EM132375061

Fully perform the five formal steps of the case analysis methodology we discussed in class and read about in our textbook while leveraging the knowledge you have gained from your strategy sessions. This includes:

Identifying the Key Question and a defensible SCQ.

Identifying which candidate solutions in the Issue Tree have been chosen for the Hyp. Tree.

Identifying and prioritizing key pieces of reasoning to research in the Hyp. Tree. (and later, which pieces are supported or not)

Creating a research plan that reflects the identified pieces of the Hyp. Tree, relative priorities, and their planned sources to check. You do not need to specify who to assign research to or whether it is primary or secondary (but you are welcome to do so if you choose).

Creating a recommendation that reflects a well-stated Big Answer, supporting reasoning, and supporting evidence for that reasoning.

Document the final state of the work in each step in a clear manner so that someone may reasonably understand and interpret what you've written (i.e. you don't need to submit early iterations/drafts, only the final state of the work).

Submit the completed set of documented steps in one easy to scroll through document.

Remember: A good analysis is updated iteratively so that each part aligns well with the next (and the last).

Scenario

After a full day of meetings with the MDCM executive team, MDCM's new CIO Shawn Atkins feels no closer to a solution. Frustrated, he turns to his "SWAT Team" - the nickname he's given to an advisory group formed from an elite subset of the twenty-three managers he identified as high potential IT leaders - a group he's asked you to lead.

Shawn has given you a short-list of questions to consider as a starting point:

What should MDCM's strategy be going forward?

What broad implications does the business strategy have on our functional IT strategy?

What are some of the strategic objectives we should prioritize for IT?

What critical success factors can we identify for our IT strategy?

Disclaimer

This is a deliberately chosen "classic" case. This means that the story is old, as are the technology references, but the issues and themes are valuable and timeliness. In analyzing the case you should interpret any technology references as their modern day equivalent, and you should plan and propose in terms of our contemporary time and era (i.e. if they say Windows assume we're talking Windows 7, 8 or 10, if you are thinking they should adopt a new online service you would look at contemporary options).

Submission requirements

Since most steps contain a tree diagram and the others benefit from general visuals, you have some discretion on how you create these, including:

PowerPoint

Visio

Hand-drawn sketches

.. or a comparable approach

However, irrespective of whatever method you use to create your work you must then translate into a single contiguous PDF document with 1-2 pages per each of the 5 analysis steps (i.e. your finished document should be 5-10 pages long). For example, if you were to hand draw out these steps (e.g. on a sheet of paper or a whiteboard), you could take a picture of each, paste those pictures into a MS Word document, and then save that document as a PDF. You must, however, ensure that whatever you create is reasonably legible to the reader (e.g. your professor).

Attachment:- IT Strategy Synchronization.rar

Reference no: EM132375061

Questions Cloud

Enterprise-wide information governance program : The knowledge needed to make informed decisions on an enterprise-wide Information Governance program for the company.
Provided with strong educational programs : At the University, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in disciplines
Windows network proposal-networking : You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal.
What would you propose as new remote access solution : What would you propose as a new remote access solution? DirectAccess? What would be the benefits of the new system?
Fully perform five formal steps of case analysis methodology : Fully perform the five formal steps of the case analysis methodology we discussed in class and read about in our textbook while leveraging the knowledge
Explain executive sponsorship-information governance plan : Explain executive sponsorship and how the Information Governance (IG) plan must support the accomplishments of the organization's professional objectives.
Article referenced above could impact our economy : Discuss how the types of threats discussed in the article referenced above could impact our economy, and how implementing Diversity
Attacks on our national infrastructure are already happening : Attacks on our national infrastructure are already happening. discuss how the types of threats discussed in the article could impact our economy
What are some different types of teams : What are different types of teams? What are goals of each type of team? What differences are there in how team members work together in these different teams.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd