Principles of Information Systems (MindTap Course List)
Principles of Information Systems (MindTap Course List)
13th Edition
ISBN: 9781305971776
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
Question
Book Icon
Chapter 11.2, Problem 2CTQ
Program Plan Intro

Strategic planning:

  • It denotes a process that helps managers identify desired outcomes as well as formulate plans to achieve objectives.
  • It uses the capabilities and resources that are available.
  • The changing nature of organization and surroundings should be considered.
  • It provides a framework and a direction that is clearly defined for guiding decision making at all levels.
  •  It ensures most effective usage by focusing resources based on priorities.
  • It enables organization to be proactive and take advantage of opportunities as well as trends.
  • It enables all units to work together towards common goal.
  • It provides measures to evaluate performances.
  • It improves communication among the organization.

Role of a business liaison person:

  • The business liaison denotes a link of communication between two business entities.
  • It denotes a professional who performs duties of maintaining relationships, exchanging information as well as promoting operations.
  • In the given case, it acts as entity between business and distribution organization.
  • The business liaison is responsible for strategic implementation of solutions.
  • It improves business efficiency while meeting corporate business goals.

Pros and cons of accepting position:

  • The pros of accepting position are shown below:
    • The skill of relationship maintenance and operation promotion gets improved.
    • It helps advance career in organization.
    • It helps to increase creative thinking abilities.
    • It helps to learn and join more closely with company goals.
  • The cons of accepting position are shown below:
    • The cost expectations may rise indefinitely.
    • The delay in project termination may occur.
    • The new technology implementation may suffice lots of issues.
    • The unskilled employees may create issues while implementation.

Blurred answer
Students have asked these similar questions
What do you think Jim’s next step would be?Why?
A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos) Your Task is: To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2]. References: [1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia. [2] https://www.sans.org/information-security-policy/
After reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that? How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance? Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Chapter 11 Solutions

Principles of Information Systems (MindTap Course List)

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning