Strategic IS planning and yearly budgeting

Assignment Help Basic Computer Science
Reference no: EM132870554

Budgeting time is an exciting time in every organization. Managers meet to come up with an estimate of needs for the areas and functions they supervise, and on the basis of the means available, new initiatives and projects are prioritized as to their perceived promise in adding to the growth of the organization.

What is the relationship between strategic IS planning and the yearly budgeting and prioritization process? What is the objective of each? Do you think that general and functional managers should be involved in decisions about funding IS assets and services? Justify your opinion. Who should be developing and presenting the business case for a new IS? Why? How would the new and existing ISs be funded and who would fund them? Propose three funding methods, and discuss the advantages and disadvantages of each.

Risks are associated with every new project that an organization considers to undertake. In the budgeting process, organizations often think of diversification of their new efforts and initiatives in order to minimize the risk of failure. What are the principal drivers and risks associated with implementing a new IS project? What are the principal drivers and risks associated with IS outsourcing? Why should an organization evaluate the aggregate risk of its portfolio of projects? What should an organization do if the current level of portfolio risk is not aligned with the degree of risk deemed appropriate according to the strategic IS plan? Justify your answers using relevant examples.

Reference no: EM132870554

Questions Cloud

Identify triple bottom lines needed to measure cost : Identify triple bottom lines needed to measure cost
Highly successful custom T-shirt business : Your best friend, Susan Stewart, has started a highly successful custom T-shirt business from your dorm room.
Understanding of effective teamwork : How would you relflect/demonstrate your understanding of effective teamwork, your ability/skill to work effectively in a team, as well as personal growth and le
General data protection regulation : The European Union legislation called the "General Data Protection Regulation" (GDPR) provides data privacy protections for consumers and has had a major impact
Strategic IS planning and yearly budgeting : What is the relationship between strategic IS planning and the yearly budgeting and prioritization process? What is the objective of each?
Determine Total Assets as of December : The account balances for White Corporation are listed below. All balances are as of December 31, 2019, Determine Total Assets as of December
Explore the problem in depth and with scholarly rigor : A critical element of section is to apply the best practices of quality management concepts and models from textbook, class discussions and researched sources
Prepare this transaction on the books of the creditor : Regales Bank agrees to accept from Manlangit Trust a building with a fair value of $18,000,000. Prepare this transaction on the books of the creditor
Different types of vpns and their underlying protocols : Explain the different types of VPNs and their underlying protocols - compare and contrast their different uses and give examples to suport your explanations.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  About the technology security

Write on any topic related to technology security.

  Evaluate the megatrend of demographics

Evaluate the megatrend of demographics in the IT field. Give your opinion as to why IT managers must understand this megatrend when selecting talent for organizational positions.

  Create a library class. include vectors of books

Then check to make sure that the user owes no fees. If the user does, report an error. If not, create a Transaction, and place it in the vector of Transactions. Also write a function that will return a vector that contains the names of all Patrons..

  Research in how wans and network applications

Discuss in scholarly detail why PSDN transport cores are drawn as a cloud? Discuss in scholarly detail and come up with a list of roles that facilitating server

  Effective enterprise risk management system

The first step in creating effective enterprise risk management system is to understand qualitative distinctions among types of risks that organizations face

  Harnessing the power of corporate culture

Review assigned article, "Harnessing the Power of Corporate Culture (Developing Leaders for a Sustainable Global Society)". Consider the "new model of leadership" discussed in the article.

  Concentration in proquest library database

Locate a dissertation on a Topic related to your Concentration in the ProQuest Library Database at the University of the Cumberlands.

  Right To Privacy And Compliance Regulations

The United States has a number of privacy laws that affect the government's use of information as well as the use of information by specific industries,

  What is inferential statistics

What is inferential statistics? Do you think you can make an inference about the data after gathering descriptive statistics?

  What type of queries benefit from parallel processing

What type of queries benefit from parallel processing? What are the benefits of parallel databases?

  Program to display a message telling the user why

The password should have at least one digit. Write a program that asks for a password and then verifies that it meets the stated criteria. If it doesn't, the program should display a message telling the user why.

  Discuss tcp-ip and packets

Your computer is connected to the Internet. Briefly explain how information is sent across the Internet. Be sure to discuss TCP/IP and packets.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd