It Security and Acquisition Strategy Acquisition Strategy Term Paper

Total Length: 690 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2

It Security and Acquisition Strategy

Acquisition strategy statements are important documents for gaining and maintaining executive support for programs and projects. What in your view are the one or two biggest challenges in developing an acquisition strategy? Give your reasons and any suggestions you have for addressing the challenge(s).

In my view, the biggest challenge arising in connection with developing an acquisition strategy is the need to communicate potentially complex technical concepts and rationales to a wide variety of stakeholders. In principle, the acquisition strategy statement must be capable of promoting "buy-in" at every level from executive leadership to management, and to individual business units and employees. Each of these groups of stakeholders typically focuses on different concerns that depend on and relate in different ways to information technology (IT) infrastructure and processes. Similarly, the needs and capabilities of IT systems are potentially very different in the way that their adoption affects all of these stakeholders in their respective responsibilities.

From the perspective of some stakeholders, proposed IT system acquisitions may represent obvious benefits immediately that make them welcome changes.

Stuck Writing Your "It Security and Acquisition Strategy Acquisition Strategy" Term Paper?

Conversely, other stakeholders may have specific reasons for reacting differently (i.e. negatively) to the same prospective acquisitions and other IT system changes. Therefore, the effectiveness of the acquisition strategy statement is substantially a function of how well its writers and organizers anticipate the many different ways that the proposed changes could impact different levels of management, business units, and end users. They must be able to garner support from each different group of stakeholders by articulating the specific advantages that the proposed acquisitions represent. To do that requires a comprehensive understanding of the ways that every potential stakeholder relies on and uses the existing IT systems and relates the new acquisitions to the benefits that those different stakeholders will derive from the proposed changes.

2. How should an organization decide on how "cutting edge" it should be in its IT acquisition strategy? Acquiring cutting edge IT might give it a competitive advantage, but at greater risk because the IT is cutting edge. On the other….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"It Security And Acquisition Strategy Acquisition Strategy" (2011, October 21) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/security-acquisition-strategy-acquisition-46688

Latest MLA Format (8th edition)

Copy Reference
"It Security And Acquisition Strategy Acquisition Strategy" 21 October 2011. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/security-acquisition-strategy-acquisition-46688>

Latest Chicago Format (16th edition)

Copy Reference
"It Security And Acquisition Strategy Acquisition Strategy", 21 October 2011, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/security-acquisition-strategy-acquisition-46688