Principles of Information Systems, Loose-Leaf Version
13th Edition
ISBN: 9781305971820
Author: Ralph Stair, George Reynolds
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Question
Chapter 11.2, Problem 2CTQ
Program Plan Intro
Strategic planning:
- It denotes a process that helps managers identify desired outcomes as well as formulate plans to achieve objectives.
- It uses the capabilities and resources that are available.
- The changing nature of organization and surroundings should be considered.
- It provides a framework and a direction that is clearly defined for guiding decision making at all levels.
- It ensures most effective usage by focusing resources based on priorities.
- It enables organization to be proactive and take advantage of opportunities as well as trends.
- It enables all units to work together towards common goal.
- It provides measures to evaluate performances.
- It improves communication among the organization.
Role of a business liaison person:
- The business liaison denotes a link of communication between two business entities.
- It denotes a professional who performs duties of maintaining relationships, exchanging information as well as promoting operations.
- In the given case, it acts as entity between business and distribution organization.
- The business liaison is responsible for strategic implementation of solutions.
- It improves business efficiency while meeting corporate business goals.
Pros and cons of accepting position:
- The pros of accepting position are shown below:
- The skill of relationship maintenance and operation promotion gets improved.
- It helps advance career in organization.
- It helps to increase creative thinking abilities.
- It helps to learn and join more closely with company goals.
- The cons of accepting position are shown below:
- The cost expectations may rise indefinitely.
- The delay in project termination may occur.
- The new technology implementation may suffice lots of issues.
- The unskilled employees may create issues while implementation.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What do you think Jim’s next step would be?Why?
After reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario.
Discussion Questions
Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?
How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?
What would it take to convince the current head of the organization to go along with your suggested changes?
Chapter 11 Solutions
Principles of Information Systems, Loose-Leaf Version
Ch. 11.1 - Prob. 1RQCh. 11.1 - Prob. 2RQCh. 11.1 - Prob. 1CTQCh. 11.1 - Prob. 2CTQCh. 11.2 - Prob. 1RQCh. 11.2 - Prob. 2RQCh. 11.2 - Prob. 1CTQCh. 11.2 - Prob. 2CTQCh. 11 - Prob. 1SATCh. 11 - Analysis of the internal assessment and external...
Ch. 11 - Prob. 3SATCh. 11 - Prob. 4SATCh. 11 - Prob. 5SATCh. 11 - Prob. 6SATCh. 11 - Prob. 7SATCh. 11 - Prob. 8SATCh. 11 - Prob. 9SATCh. 11 - Prob. 10SATCh. 11 - According to the Project Management Institute...Ch. 11 - Prob. 12SATCh. 11 - Prob. 1RQCh. 11 - Prob. 2RQCh. 11 - Prob. 3RQCh. 11 - Prob. 4RQCh. 11 - Prob. 5RQCh. 11 - Prob. 6RQCh. 11 - Prob. 7RQCh. 11 - Prob. 8RQCh. 11 - Prob. 9RQCh. 11 - What is a core competency? Project scope? Project...Ch. 11 - Prob. 11RQCh. 11 - Identify and briefly describe the nine areas of...Ch. 11 - Prob. 13RQCh. 11 - Prob. 14RQCh. 11 - Prob. 15RQCh. 11 - Prob. 16RQCh. 11 - Prob. 17RQCh. 11 - Prob. 18RQCh. 11 - Prob. 1DQCh. 11 - Prob. 2DQCh. 11 - Prob. 3DQCh. 11 - Prob. 4DQCh. 11 - Prob. 5DQCh. 11 - Prob. 6DQCh. 11 - Prob. 7DQCh. 11 - Prob. 8DQCh. 11 - Is there a difference between project time...Ch. 11 - Discuss the team dynamics for a highly effective...Ch. 11 - What sort of behaviors would indicate that the...Ch. 11 - Prob. 12DQCh. 11 - Prob. 13DQCh. 11 - How would you respond to a project team member who...Ch. 11 - Prob. 1PSECh. 11 - Prob. 3PSECh. 11 - Prob. 1TACh. 11 - Prob. 2TACh. 11 - Prob. 3TACh. 11 - Prob. 1WECh. 11 - Prob. 2WECh. 11 - Prob. 3WECh. 11 - Prob. 1CECh. 11 - Prob. 2CECh. 11 - Prob. 3CECh. 11 - Prob. 1CTQ1Ch. 11 - Prob. 2CTQ1Ch. 11 - Prob. 3CTQ1Ch. 11 - Prob. 1CTQ2Ch. 11 - Prob. 2CTQ2Ch. 11 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- What actions would you recommend to minimize potential start-up issues for this virtual team?arrow_forwardWhere do you believe the responsibility for information security begins and ends in a company? In order to know when security policies and procedures become active and inactive, we must know how much control the organization has over those times. Perceived or actual, do you think any of these boundaries will be increased in size? If this is the case, tell us how and why you went about it. If this isn't the case, why is that?arrow_forwardWhy did these new types of hacking start to pop up? I need to know where you got this information so I can give you a good answer.arrow_forward
- What do you think are the sources of theinformation Jim and his team collected?How do you think they collected all of thatinformation?arrow_forward2. Why do you think the team involved her husband? 3. What else would you advise?arrow_forwardWhy is it important to preserve and keep your informant's loyalty?arrow_forward
- For each point, I need to write one paragraph ( I need the paragraph to be general and doesn’t go in details about the cyber aspects ) 1- what is cyber safety 2- How to protect yourself online 3- What will the future of cyber safetyarrow_forwardHow are decisions about an individual's risk status arrived at?arrow_forwardWalk me through some of the possible avenues for resolving this standoff.arrow_forward
- Some experts in the area of information technology security believe that companies should bring on former hackers to act as consultants in order to strengthen their defenses. That's what you think, right? A good justification or a terrible one?arrow_forwardAre you able to tell the difference between dangers that are unavoidable and those that can be avoided or mitigated?arrow_forwardIf you could explain what you mean by "security service," that would be great.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning