Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

Q1: Developing IT governance

As organisations grow, effective IT governance becomes more and more necessary. With computing technology integrated into the facets of everyday life, many organisations are entrusted and responsible for the confidential business and personal information of clients and customers. As one might expect, there are now many regulations imposed on how to store, protect and recover (if lost) such data. All that said, IT governance is not a universal tool that works the same way in all organisations.

The scale of an organisation determines its IT needs, which in turn affects the level of required IT governance. Luckily, this governance need not be derived without guidance.There are some general best practices from which to extrapolate from. With that thought in mind, for this Discussion, assume your manager came to you and asked you to develop (or revise) the IT governance for your organisation:What would be the five steps that you would initially take and why?

To complete this Discussion

Post: Create an initial post in which you recommend five initial steps for developing or revising the IT governance for an organisation you work for or are familiar with. Explain why you would recommend these steps and justify your reasoning with (at minimum) general best practices in IT governance, the IT requirements of your selected organisation and any IT regulation your organisation needs to adhere to. Furthermore, explain why you would take your recommended steps in the order you suggested. Be sure to also provide a brief summary of your selected organisation to provide context.

Q2: IT portfolio management

A key objective often associated with IT governance is that of IT portfolio management. Essentially, this consists of the entirety of an organisation's IT resources. However, these IT resources are not merely the tangible pieces of technology employed by an organisation. These resources consist of IT-related costs, risks and value, existing IT projects, continual IT services and so on. Moreover, as an organisation grows and an enterprise expands, effectively managing an IT portfolio is all the more imperative.

Regardless of size, however, every organisation should have some form of common process for managing its IT portfolio. There has to be a means of evaluating the overall value being delivered to the organisation from its IT resources. For this Discussion, your challenge is to analyse best practices for managing an IT portfolio and examine ways in which to add value to an organisation.

To complete this Discussion

Post: Create an initial post in which you analyse how an IT portfolio can help add to the overall value being delivered to an organisation. In your analysis, address how an IT portfolio can reduce the proportion of the IT budget spent on maintenance. Also, explain how making IT spending more transparent, in order to simplify the technology environment, adds value.

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M91614984
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Software Engineering

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

Reply to this article with apa referencehate crimes

Reply to this article with APA reference. Hate crimes According to Merriam-Webster, hate crime is any of various crimes (such as assault or defacement of property) when motivated by hostility to the victim as a member of ...

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

Assignment lab - statement of workclient liberty vacation

Assignment Lab - Statement of Work Client: Liberty Vacation Planning Inc. (LVP) Project: Website Assessment 1. Project Objectives With this statement of work, LVP is engaging you to conduct a website assessment to determ ...

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Write review on this article with apa formatalthough

Write review on this article with APA format. Although computer crimes are being seen in our society more and more each day, it is still difficult to prosecute people who commit these crimes mainly because everything is ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As