Information Strategy

In: Computers and Technology

Submitted By jabidii
Words 1595
Pages 7
Research Defined * A systematic attempt to provide answers to questions or problems. It is a “scientific study”. * The manner in which men solve the knotty problems in their attempt to push back the frontiers of human ignorance.
Characteristics of Research 1. Research begins with a question in the mind of the researcher. 2. Research requires q plan. 3. Research demands a clear statement of the problem. 4. Research deals with the main problem through subproblems. 5. Research seeks direction through appropriate hypotheses. 6. Research deals with facts and their meaning. 7. Research is circular.
Purposes and Goals of Research 1. To discover new facts about known phenomena. 2. To find answers to problems which are only partially solved by existing methods and information. 3. Improve existing techniques and develop new instruments or product. 4. TO discover previously unrecognized substances or elements. 5. Discover pathways of action of known substances and elements. 6. To order related, valid generalizations into systematized science. 7. To provide basis for decision making in business, industry, education, government, and in other undertakings. 8. To satisfy the researcher’s curiosity. 9. To find answers to queries by means of scientific methods. 10. To acquire a better and deeper understanding about one phenomenon. 11. To expand or verify existing knowledge.

The Research Process
Research holds the hypotheses until all the facts are in and interpreted, At that point, the hypotheses are supported or rejected.
Research holds the hypotheses until all the facts are in and interpreted, At that point, the hypotheses are supported or rejected.

System View of Research

Input * Knowledge and skills in the conduct of research process. * Material resource * Time resources *…...

Similar Documents

At&Tmarketing Strategy Information

...AT&T Marketing Strategy Indicates Next-Gen iPhone Could Be Called "4G" BY A.T. Faust III on Fri May 06th, 2011 http://appadvice.com/appnn/2011/05/att-marketing-strategy-nextgen-iphone-called-4g Since time immemorial (read, “2008″), man has, with each impending refresh, debated the potential hot new names for Apple’s certain hot new iDevices. We are in such an era right now. With the upcoming unveiling of the next-generation iPhone, speculation is running wild regarding the name to be bestown upon it. iPhone 4G? iPhone 4S? iPhone 4GS? iPhone 5? iPhone SomethingElseEntirely? We don’t know (and won’t know) until Apple tells us, but some conspiracy theorists have noticed some promoted half-truths coming out of AT&T’s marketing department about what exactly constitutes cellular “4G” speed. Says Chris Ziegler, We’re well past the dream of saving the term “4G” to describe 100Mbps mobile networks, which was the original intent laid out by the UN’s International Telecommunication Union early in the last decade. We’re also well past saving it for LTE and WiMAX… But I’ve realized today that the term has reached new levels of irrelevance, because [At&T and T-Mobile are] not even saving it to describe the full capabilities of their newly-upgraded HSPA+ networks. The takeaway from this line of product-designation is simple: “4G” no longer means “4G,” nor does it even mean the slower 21 Mbps HSPA+. No, “4G” now means anything in the ballpark of 14.4 Mbps transfer capability. Or,......

Words: 2551 - Pages: 11

Sustainability and Information Technology: Nigeria’s Entry Strategy

...Sustainability and Information Technology: Nigeria’s Entry Strategy The following dialogue ensued between a father and a son. Son: Daddy, why did Nigeria not join the Agricultural and Industrial Revolution? Father: We were not an independent nation; we were being colonized by the British Government, the father muttered. Son: It’s ok Daddy, the boy exclaimed. At least now that we are an independent nation, we will take advantage of the Information Technology (IT) Revolution. Father: I hope so too, my son. I write this article with so much enthusiasm and vigor that Nigeria will be able to take advantage of the IT revolution. However, for us to take advantage of the IT revolution, we need to make a sustainable investment that will enable our unborn children benefit from the legacies we leave behind for the next generation. Sustainability originates from the Latin word sustinere (meaning to hold) and in human terms, sustainability is the long-term management of the environment, economy and social entities on the face of the earth. In the articles context, we wish to adopt sustainability as a vehicle that will enable us deliver a long term strategy that will enhance Nigeria socio-economic development. So the big question is: 1. How will Information Technology sustain Nigeria’s Economic growth? 2. What strategy can Nigeria adopt to become an IT-driven nation? Let me begin the question by answering question number 2, the reason being that Information technology has......

Words: 697 - Pages: 3

Management Information System - Strategy & Technology

...Strategy & Technology Pg 69-77 Major sources of competitive advantage Brand Scale Switching Costs & Data Differentiation Network Effects Distribution Channels Brand A firm’s brand is the symbolic embodiment of all the information connected with a product or service. A strong brand proxies quality and inspires trust Viral Marketing (consumer promotes product or service if a firm performs well) Brands Amazon eBay Google Viral Marketing Google Hotmail Skype eBay Facebook YouTube Scale Business benefit from economies of scale when the cost of an investment can be spread across increasing units of production or in serving a growing customer base. A growing firm may also gain bargaining power with its suppliers or buyers. Scale of technology of investment can also act as a barrier to entry, discouraging new, smaller competitors. Economies of scale BlueNile (sold as many diamonds in 1 year with one location as a traditional jeweler would with 116 stores.) Bargaining power with suppliers or buyers Dell (make concessions) eBay (raise auction fees) Scale of technology Intel (pioneer in cutting edge technologies) Google (runs on an estimated 450,000 to 1 Mio servers) Switching costs & data Switching costs exist when consumers incur an expense to move from one product to another. Data can be a particularly strong switching cost for firms leveraging technology. In order to win customers from an established incumbent, a late-entering rival must offer a......

Words: 490 - Pages: 2

Information Security Strategy and Architecture

...INFORMATION SECURITY STRATEGY AND ARCHITECTURE The path for risk management and the security panels consumed by a corporation are offered by information security strategy and architecture, which is very important to any companies and organizations. The security architecture would need to define the way that obligation would be accomplished in the numerous regions of the corporate. Furthermore, the security architecture must report past activities that have affected the company’s information properties. These incidences designate areas that may need larger safekeeping controls. Fresh intimidations may compel differences in the security design and supplementary controls. The safekeeping design must also integrate with the current technology substructure and postulate assistance in inaugurating the appropriate risk controls needed for the corporate to accomplish its business firmly. Its purpose is significant in proposing risk management for the foundation and for organizing the controls that diminish that hazard. A safety package is not an occurrence management guides those particulars what transpires if a security break is noticed. It takes a usual method that labels in what way part of corporation is tangled in the package. A decent safety package delivers the immense copy in what way to retain corporation's facts protected. It designates in what way the package regularly will be re-evaluated and rationalized, and when we will measure compliance with the program.......

Words: 1510 - Pages: 7

Formulating Information Systems Risk Management Strategies Through Cultural Theory

...available at www.emeraldinsight.com/0968-5227.htm IMCS 14,3 Formulating information systems risk management strategies through cultural theory Aggeliki Tsohou, Maria Karyda and Spyros Kokolakis Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece 198 Evangelos Kiountouzis Department of Informatics, Athens University of Economics and Business, Athens, Greece Abstract Purpose – The purpose of this paper is to examine the potential of cultural theory as a tool for identifying patterns in the stakeholders’ perception of risk and its effect on information system (IS) risk management. Design/methodology/approach – Risk management involves a number of human activities which are based on the way the various stakeholders perceive risk associated with IS assets. Cultural theory claims that risk perception within social groups and structures is predictable according to group and individual worldviews; therefore this paper examines the implications of cultural theory on IS risk management as a means for security experts to manage stakeholders perceptions. Findings – A basic theoretical element of cultural theory is the grid/group typology, where four cultural groups with differentiating worldviews are identified. This paper presents how these worldviews affect the process of IS risk management and suggests key issues to be considered in developing strategies of risk management according to the different perceptions......

Words: 9716 - Pages: 39

An Empirical Study of Pricing Strategies in an Online Market with High-Frequency Price Information

...An Empirical Study of Pricing Strategies in an Online Market with High-Frequency Price Information Sara Fisher Ellison M.I.T. Christopher M. Snyder Dartmouth College June 2010 Abstract: We study competition among a score of firms participating in an online market for a commodity-type memory module. Firms were able to adjust prices continuously and prices determined how the firms were ranked and listed (lowest price listed first), with better ranks contributing to firms' sales. Using a year's worth of hourly data, we document the pricing dynamics, cycles, and other patterns in this market. We then characterize empirically the factors which drive price changes, noting clear evidence of firm heterogeneity in the choice of pricing strategy. Finally, we develop a framework for simulating counterfactual market settings, using the simulations to examine counterfactuals involving different mixes of firms according to pricing strategies. JEL Codes: L11, C73, D21, L81 Contact Information: Ellison: Department of Economics, M.I.T., 50 Memorial Drive, Cambridge, MA 02142; tel. (617) 253-3821; fax. (617) 253-1330; email sellison@mit.edu. Snyder: Department of Economics, Dartmouth College, 301 Rockefeller Hall, Hanover, NH 03755; tel. (603) 646-0642, fax. (603) 646-2122, email chris.snyder@dartmouth.edu. Acknowledgments: The authors are grateful to Hongkai Zhang for superb research assistance and to Glenn Ellison for a number of useful conversations. 1.......

Words: 12591 - Pages: 51

Information Technology – Oriented Strategy

...INFORMATION TECHNOLOGY – ORIENTED STRATEGY * Daniel Bell (1985) examined the sociological consequences of information technology. * Bell was an American sociologist, writer, editor, and professor emeritus at Harvard University who was best known for his contributions to post-industrialism. * One of his most influential books was entitled The Coming of Post-Industrial Society. * The three components to a post-industrial society, according to Bell: * a shift from manufacturing to services * the centrality of the new science-based industries * the rise of new technical elites and the advent of a new principle of stratification. *  Gloria Schuck and Shoshana Zuboff looked at psychological facets. * Zuboff claims that information technology is widening the divide between senior managers and operational level managers. She also claims that prior to widespread use of computer systems, managers, even at most senior level, engaged in both strategic decisions and routine administration but as computers facilitated, these activities move down the hierarchy. * In 1990, Peter Senge collaborated with Arie de Geus and theorized the importance of the use of information in the success of the organization. * Learning organization is an organization where people continually expand their capacity to create the results they truly desire, where new and expansive patterns of thinking are nurtured, where collective......

Words: 699 - Pages: 3

Sec 402 Week 4 Assignment 1 - Developing the Corporate Strategy for Information Security

...SEC 402 WEEK 4 Assignment 1 - Developing the Corporate Strategy for Information Security To Purchase Click Link Below: http://strtutorials.com/SEC-402-WK-4-Assignment-1-Developing-the-Corporate-Strategy-fo-SEC4022.htm SEC 402 WK 4 Assignment 1 - Developing the Corporate Strategy for Information Security Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy. As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets. Write a five to seven (5-7) page paper in which you: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a.......

Words: 327 - Pages: 2

Discuss How the Business Strategy Affects Information Systems and Organizational Decisions at Roche and How Information Systems Support Roche’s Business Strategy?

...DISCUSS HOW THE BUSINESS STRATEGY AFFECTS INFORMATION SYSTEMS AND ORGANIZATIONAL DECISIONS AT ROCHE AND HOW INFORMATION SYSTEMS SUPPORT ROCHE’S BUSINESS STRATEGY? Business strategy with information systems strategy and organizational strategy can form a Triangle. This triangle is known as the information systems strategy triangle and highlights the alignment necessary between decisions of business strategy, information systems, and organizational design. This means any adjustment to one of them will affect the other two. Organizational strategy, information strategy and business strategy must complement each other and they must be designed so that they support, rather than hinder each other. In successful companies the business strategy is the most important element in the “Triangle”. But to be a real success a firm must balance these three strategies: business, organizational, and information systems (Pearlson & Saunders, 2013). Business Strategy Organizational Strategy Information Strategy The Information Systems Strategy Triangle Business strategy should drive information system decision making, and changes in business strategy should entail reassessments of information systems. Moreover changes in information systems potential should trigger reassessments of business strategy. If a decision is made to change business strategy of the “triangle”, it is......

Words: 1755 - Pages: 8

Information Strategy

...additional phase. What is it, and where does it fall in the continuum? Phase 1: Uses healthy volunteers (a few dozen up to 300) to conduct tests on the side effects, how the drug is metabolized, and excreted. If unacceptable toxicity is not revealed than they move on to the next phase. Phase 2: There is emphasis on the effectiveness of a drug within people with certain conditions or diseases. Then the sponsors and the FDA determine how the study will be done. Phase 3: This is when more information about safety is found. At this point the study is expanded to various dosage, various drug interactions (combination), and also various groups of people. The number of participants can range from several hundred to around 3,000. The additional phase is called postmarket requirement and commitment studies. This happens when the the sponsor agrees to after the FDA has approved the drug for marketing. This stage gathers additional information about the safety and efficacy. This phase also gathers information about optimal uses of the product as well. What is the difference between an IND and an NDA? The IND (Investigation New Drug Application) The pharmaceutical industry often develop new drugs and do preclinical trials by testing drugs on animals. They bring their findings to the FDA and their proposed testing for clinical trials on humans. The NDA (New Drug Application) this step includes all the clinical and pre-clinical analysis and is the formal step in that the......

Words: 867 - Pages: 4

Sec 402 Wk 4 Assignment 1 – Developing the Corporate Strategy for Information Security

...SEC 402 WK 4 Assignment 1 – Developing the Corporate Strategy for Information Security Click Link Below To Buy: http://hwcampus.com/shop/sec-402-wk-4-assignment-1-developing-the-corporate-strategy-for-information-security/ Or Visit www.hwcampus.com SEC 402 WK 4 Assignment 1 – Developing the Corporate Strategy for Information Security Write a five to seven (5-7) page paper in which you: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization. b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an......

Words: 253 - Pages: 2

Sec 402 Wk 4 Assignment 1 – Developing the Corporate Strategy for Information Security Click Link Below to Buy: Http: //Hwcampus.Com/Shop/Sec-402-Wk-4-Assignment-1-Developing-the-Corporate-Strategy-for-Information-

...SEC 402 WK 4 Assignment 1 – Developing the Corporate Strategy for Information Security Click Link Below To Buy: http://hwcampus.com/shop/sec-402-wk-4-assignment-1-developing-the-corporate-strategy-for-information-security/ Or Visit www.hwcampus.com SEC 402 WK 4 Assignment 1 – Developing the Corporate Strategy for Information Security Write a five to seven (5-7) page paper in which you: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization. b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an......

Words: 253 - Pages: 2

What Macro Information Leads to Long-Term Investment Strategy?

...MFIN7014 Fund Management and Alternative Investments Section 2A, 2015 Discussion paper I What macro information leads to long-term investment strategy? Shuqin Zhao Stu.ID: 3035236775 Canada Pension Plan Investment Board (CPPIB) as a professional investment management organization, it focuses on long investment horizon which gives it advantages on risk control and long-term opportunities over competitors. Longterm investment requires asset managers to be more sensitive to future economy trend. Ted Lee pointed out that for long-term view, US market continues to shrink, while the future three group countries will be China, India and Brazil, due to their low correlation with international capital which benefits the portfolio. While India and Brazil are respectively going through political change and recession, opportunities could be largely obsessed in the future, as seen by professionals. In 2015, most of money actually came from Asia, but this is not the only macroeconomy signals that lead to such certainty about future market segments. Based on conversation with Ted, I conclude another strong macro-economy signal as business development. On September 19th 2014, Alibaba IPO ranked as biggest IPO in the world after additional shares sold, which surpassed a previous global record set by Agricultural Bank of China Ltd in 2010. Looking through past five years, largest IPOs includes a lot of Chinese company, which indicates strong signal of......

Words: 670 - Pages: 3

Information Strategy Triangle

...The Information Strategy Triangle The information strategy triangle comprises of three points, Business Strategy, Organizational Strategy and Information Strategy. Business Strategy is a well-articulated vision that provides goals that needs to be achieved, the objective behind the goals, a roadmap of various stages and finally the various steps to achieve the goal. In my opinion, Organizational and IS Strategy are the left and right hands of Business Strategy. They are the main tools to accomplish the vision derived during business strategy. Any change in the business requires necessary changes in others in order to achieve a goal. Business Strategy can be defined as a plan that company opts for which includes the selection and application of resources in order to accomplish a competitive advantage. Organizational Strategy defines the organization structure within the company and suggests necessary changes to form a successful team. It is important the company understands the gap between the current and desired state. Some of the essential factors that are considered while developing the organizational strategy are - new skills that are required by the company, talent management practices required to create high performing team and the culture that the company practices. Information Strategy on the other hand focusses on developing the right information technology architecture, selection of right software applications and hardware to support the business strategy. None......

Words: 458 - Pages: 2

Advanced Management Strategies - Based on the Information Related to the Information, Control and Reward Systems Available in the Case, Examine Whether These Systems Are Appropriate for the Type of Strategy Being Implemented

...Advanced Management Strategies CASE – 1 MANAGING HINDUSTAN UNILEVER STRATEGICALLY Questions: 1. State the strategy of Hindustan Unilever in your own words. 2. At what different levels is strategy formulated in HUL? 3. Comment on the strategic decision-making at HUL. 4. Give your opinion on whether the shift in strategic decision-making from India to Unilever’s headquarters could prove to be advantageous to HUL or not. CASE: 2 THE STRATEGIC ASPIRATIONS OF THE RESERVE BANK OF INDIA Questions: 1. Consider the vision and mission statements of the Reserve Bank of India. Comment on the quality of both these statements. 2. Should the RBI go for a systematic and comprehensive strategic plan in place of its earlier pragmatic approach of responding to environmental events as and when they occur? Why? CASE: 3 THE INTERNATIONALISATION OF KALYANI GROUP Questions: 1. What is the motive for internationalisation by the Kalyani Group? Discuss. 2. Which type of international strategy is Kalyani Group adopting? Explain. CASE 4: THE STORY OF SYNERGOS UNFOLDS Questions: 1. Identify the type of organisation structure being used at Synergos and explain how it works. What are the benefits of using this type of structure? What are the pitfalls? 2. Express your opinion about whether the structure is in line with the recruitments of the strategy that......

Words: 373 - Pages: 2