Task 1 DOMAIN 321 – IT STRATEGIC SOLUTIONS Competency 321.1.3: Researching New Technology – The grad

Task 1 DOMAIN 321 – IT STRATEGIC SOLUTIONS

Competency 321.1.3: Researching New Technology –

 The graduate formulates personal research strategies for maintaining awareness of current and emerging technology.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Competency 321.1.4: Strengths, Weaknesses, Opportunities, and Threats – The graduate evaluates new technology opportunities for alignment with given organizations’ strengths, weaknesses, opportunities, and threats.

Introduction:

Read the attached “AEnergy Company Case Study” before completing this task. (Document attached along as a pdf) 

  Scenario

AEnergy Company currently has operations in Fresno, California and Chicago, Illinois. Company management reviewed the company’s client list and realized that much of the company’s growth has been from an increase in clients in the eastern and southern parts of the United States. Management believes that these clients could be better served with more localized production and with sales locations in each region. The new locations would also provide an improved possibility for growth in the regional client base.

Before expansion can take place, the existing IT infrastructure will need to be evaluated to see how it needs to change to support the planned growth. You have been asked by the chief technology officer (CTO) to study the current IT infrastructure using a SWOT analysis. You will research current and emerging technologies and use your research to suggest an updated system that will resolve the identified deficiencies while also supporting the identified strengths the current system offers.

Task:

Write a technology upgrade proposal to the CTO of AEnergy Company in which you do the following: 

  A.  Perform a SWOT analysis of the existing IT infrastructure by doing the following: 1.  Evaluate the existing strengths of the current IT infrastructure. 2.  Evaluate the existing weaknesses of the current IT infrastructure. 3.  Analyze opportunities for updating technology within the current IT infrastructure. 4.  Analyze threats that could result from continued use of the current IT infrastructure.

 ……. ….. B.  Analyze the results obtained in the SWOT analysis by doing the following: 1.  Identify at least two ways to leverage the strengths of the current IT infrastructure to improve the company’s existing products and services. a.  Identify at least two opportunities within the current IT infrastructure to bring new products and services to the marketplace. 2.  Discuss the weaknesses and threats in the current IT infrastructure based on their impact or potential for impact. 3.  Discuss the one weakness or threat with the greatest potential for impact on the IT infrastructure. C.  Research potential solutions that could address the weakness or threat discussed in part B3. 1.  Discuss your personal research strategies for identifying and evaluating current technologies. a.  Give at least two examples of current technology that could address the weakness or threat you discussed in part B3. 2.  Explain how you plan to stay informed about current technologies. a.  Give at least two examples of emerging technology that could help the company gain a competitive advantage. D.  Recommend one specific IT solution that will best address the weakness or threat that you identified in part B3. 1.  Justify your recommended IT solution based on your research. E.  When you use sources, include all in-text citations and references in APA format. Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.

Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.

Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.

Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section.

 ……. …..
Task 2 DOMAIN 321 – IT STRATEGIC SOLUTIONS

Competency 321.1.8: Communication Plans – The graduate develops communication plans that effectively convey business justification for technology initiatives. Introduction:

Read the attached “AEnergy Company Case Study” before completing this task.
Scenario:

AEnergy Company has current operations in Fresno, California, and Chicago, Illinois. You were asked by the chief technology officer (CTO) to complete a SWOT analysis of the current IT infrastructure and to suggest a technology upgrade project to resolve a major deficiency while also supporting the identified strengths the current system offers. The CTO has tentatively approved the concept for the proposed upgrade, and your responsibility is now to create a plan to communicate with the various stakeholders (internal and external) and how it will impact their success in achieving their part of the corporate mission. 

  Task: A.  Create a communication plan that introduces a technology initiative to the stakeholders (i.e., Diffusion of Innovation Plan). Note: If you completed the technology upgrade in Task 1, you may adapt it for use in this task. 1.  Justify how your communication plan effectively conveys the reasons for this initiative. 2.  Justify why components of the plan are necessary based on the needs of threeinternal stakeholders. 3.  Justify why components of the plan are necessary based on the needs of oneexternal stakeholder. B.  When you use sources, include all in-text citations and references in APA format.

  Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.

Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.

Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.

Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section.

 
Task 3 DOMAIN 321 – IT STRATEGIC SOLUTIONS

Competency 321.1.5: Ethics – The graduate develops technology policies that ensure ethical actions regarding technology and data.

Competency 321.1.6: Risk Mitigation – The graduate develops risk mitigation plans that effectively address possible security threats.

Competency 321.1.7: Data Security – The graduate develops security precautions that protect organizational data.

Introduction:

Read the attached “AEnergy Company Case Study” before completing this task. ……. …..

Scenario:

AEnergy Company has some security policies established (See Appendix at end of Case Study). However, there have been some incidents that have created doubt about the effectiveness of the protections offered by the current policies. For example, an employee’s laptop computer was recently stolen at the airport while the employee was traveling on company business. Management has asked you to analyze the company systems and update the policies as necessary so the company is protected from potential threats from both external parties and internal users of the company technology.

Task: A.  Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyAccounting Security Policy”) in regard to ethical issues. 1.  Discuss two potential unethical uses of the company technology and/or data by internal users. 2.  Discuss two potential unethical uses of the company technology and/or data by external parties. B.  Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyAccounting Security Policy”) in regard to security threats. 1.  Discuss two potential security threats to the company technology and/or data from internal users. 2.  Discuss two potential security threats to the company technology and/or data from external parties. C.  Create updated company policies that outline expectations related to use of company technologies by internal users and issues with external parties. 1.  Explain how your changes would mitigate the unethical uses discussed in parts A1 and A2. 2.  Explain how your changes would mitigate the security threats discussed in parts B1 and B2.
D.  When you use sources, include all in-text citations and references in APA format.

Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.

Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.

Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.

Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section.
……. ….. Task 4 DOMAIN 321 – IT STRATEGIC SOLUTIONS

Competency 321.1.1: Technology Strategy –

 The graduate develops strategic technology plans that include vision, standards, and direction of technology in line with organizational strategy.

Competency 321.1.2: Gap Analysis – The graduate conducts industry standard gap analyses of organizations’ current technology and future needs.

Competency 321.1.9: Globalization – The graduate evaluates potential technology solutions for alignment with organizational global strategy.

Introduction:

Read the attached “Shore & More Bicycles Case Study” before completing this task.

Scenario:

You are the new IT team member of Shore & More Bicycles and have been asked by the chief information officer (CIO) to research a comprehensive new IT system. The company is expected to double in size within four years.

Shore & More Bicycles is a U.S. based import/export company with many of its products coming from suppliers in Asia. The system you propose should include technology that can grow with the business (scalable) and support its total operations, including customer Internet orders, retail store operations, supplier orders and communications, and internal operations.

Taking into consideration current and emerging technology, you will provide a report to your CIO in which you recommend and justify an IT system overhaul. This report will address all relevant issues (i.e., hardware, software, system support, human resource needs) as well as provide proper documentation for concerned stakeholders.

Task: A.  Identify 8–10 key aspects of the IT infrastructure that must be in place to support the growth strategy of the company. B.  Perform a gap analysis of the company’s current technology and future needs for the aspects identified in part A. C.  Recommend one way to upgrade and reorganize the IT infrastructure (e.g., systems) across the company to address the company’s future technology needs. Include the following elements in your discussion: •  Currently available hardware •  Currently available software •  Company’s need for system support •  Emerging technology for later implementation into the proposed system D.  Create a report for management that presents important information they will need to improve the system proposal. 1.  Create a prioritized three-year plan for the CTO, including a rollout schedule and business justification for implementing the recommended IT system from part C. 2.  Discuss the human resource needs for the recommended IT system. 3.  Discuss how the recommended IT infrastructure would help support the company’s globalization. 4.  Discuss how a specific emerging technology would enable the company to provide a new product or service to customers. E.  When you use sources, include all in-text citations and references in APA format.

  Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.

  Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.

Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.

Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section. ……. …..