Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Discussion Question 1. Acquisition strategy statements are important documents for gaining and maintaining executive support for programs and projects. What in your view are the one or two biggest challenges in developing an acquisition strategy? Give your reasons and any suggestions you have for addressing the challenge(s).

Discussion Question 2. How should an organization decide on how "cutting edge" it should be in its IT acquisition strategy? Acquiring cutting edge IT might give it a competitive advantage, but at greater risk because the IT is cutting edge.

On the other hand, the use of well-tested, mature IT that is also being used by many others reduces the risk, but it also may eliminate competitive advantage possibilities. How can the organization decide where along the continuum of very mature to cutting edge technology it belongs in its IT acquisition strategy?

Discussion Question 3. Market Research is one part of the Basic Acquisition Approach section of the Acquisition Strategy Statement. One objective of market research is to enable the buyer organization to know how external organizations solved a comparable problem and the performance levels they achieved.

Another objective of market research is to determine the extent to which there are IT services contractors qualified to perform the services that the buyer organization requires for its IT acquisition project.

Market research can become a costly and time-consuming, so sometimes this important activity gets insufficient attention in a project. Are there efficient ways of obtaining market research information so it is not viewed as too costly or too time consuming? Describe any that you are familiar with.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92502834

Have any Question?


Related Questions in Management Information System

Question onea identify six major components of a computer

QUESTION ONE a) Identify six major components of a computer system. b) Describe the following with reference to systems development. 1. Structured analysis 2. Structured design c) The current trend in database systems de ...

From the first e-activity identify the following cpus 1 the

From the first e-Activity, identify the following CPUs: 1) the CPU that resides on a computer that you own or a computer that you would consider purchasing, and 2) the CPU of one (1) other computer. Compare the instructi ...

Assessment instructionsbriefly detail the appropriate

Assessment Instructions Briefly detail the appropriate business requirements, IT goals, and parameters for your selected organization, and then analyze the security framework and cryptography strategies, physical network ...

Questions what is your practical experience with physical

Questions : What is your practical experience with Physical Security Protocols? In your current job, what are the physical security protocols that you are required to follow and explain the one you find most annoying? Wh ...

Preparationuse the organization and characteristics

Preparation Use the organization and characteristics, described in the Mega-Corp Case Study found in the Resources under the heading, Capella Resources, as the context in which to answer the bullet points in this assessm ...

Disaster recoverysearch scholar google for a company school

Disaster Recovery: Search "scholar google" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were ma ...

Assignmentvideo title find trends in your profession

Assignment Video Title : Find Trends in Your Profession (Youtube) In  this project, you will search for information that will enable you to  identify three top trends in your profession or field. Over the course  of the ...

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

Question social engineering techniques are often used to

Question : Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly desc ...

Your company wants to develop special resources for project

Your company wants to develop special resources for project managers in its new project management office. There are many approaches to financial analysis of prospective projects. Having an idea of how project budgets ca ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As