8 pages/≈2200 words
IT & Computer Science
Challenges in Identifying and Documenting IT Acquisition Requirements (Coursework Sample)
Challenges in Identifying and Documenting IT Acquisition Requirements. The sample has three parts: 1. Define terms given, 2. Explain if It is permissible to add, delete or change requirements after they have been approved up to the time a contract has been signed with a service provider, even during the subsequent project. 3. Identify the processes involved in completing your project. source..
Challenges in Identifying and Documenting IT Acquisition Requirements Student Name University Name Course Title Instructor's Name Date Quiz 1. IT acquisition refers to the outsourcing of information technology solutions to external providers. This may involve the development of software to support web-based services, such as e-commerce platforms. The two most challenging issues in identifying and documenting IT acquisition requirements include the diversity of users and dynamics of usage. Diversity of users is a challenge in the identification and documentation of IT acquisition, since it is difficult to determine the perfect software specifications to meet the needs of different users (Creel & Ellison, 2012). For instance, when a business wants to move its services online, it must anticipate the needs of customers with varying digital literacy levels (Abdi et al., 2013). Designing the ideal interface to meet the needs of these diverse users is often a major challenge during the acquisition of IT solutions. Secondly, usage of IT solutions is not static, but dynamic (Creel & Ellison, 2012). For instance, a company may initially develop a website to engage its customers online. With time, it may become viable not only to sell online, but to integrate payment systems and customer support platforms. The implication of this scenario is that the company may need to redesign the website to accommodate the new features. Nevertheless, there are a number of measures that organizations can take to anticipate and address these challenges. One solution is using the eSourcing Capability Model, which outlines the steps to take to minimize risks when outsourcing IT functions (Hefley & Ethel, 2006). For instance, clients should clarify the need to acquire, spell out the system requirements in light of the diversity of users and dynamics of usage, and carry out a risk-benefit analysis (Hefley, 2006). This will ensure that the acquired system is functional and optimized to meet the needs of the intended users. Quiz 2. It is permissible to add, delete or change requirements after they have been approved up to the time a contract has been signed with a service provider, even during the subsequent project. This is because the diversity of users and dynamics of usage necessitates the need to modify IT systems to address emerging issues (Creel & Ellison, 2012). For example, a software that was originally conceived to enhance online payments may become susceptible to security risks, such as hacking. The company will need to add security features to make it safe from hackers. At the same time, if a company expands its operations into foreign markets, it may need to design a multilingual website to make it accessible to an international audience. Quiz 3. One project that I have successfully completed was writing my undergraduate thesis. Because I had to complete it within three months and between classes, I broke it down into smaller weekly tasks. For instance, I completed the project in phases, which included defining the problem...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Heuristic Principles ReflectionDescription: The knowledge and skills obtained from this course are vital because it plays an instrumental role in enabling me to fulfill my duties as a data engineer. As a data engineer, the main goal is to make data accessible so that a particular form can utilize it to maximize its performance. As a data engineer ...1 page/≈550 words| 2 Sources | APA | IT & Computer Science | Coursework |
- Database Security and SQL InjectionDescription: Executives at all levels of an organization and IT professionals at all levels should have a working knowledge of database security issues like SQL injection. There are a variety of methods firms employ to protect their databases from both external and internal threats. Database security includes...1 page/≈275 words| 4 Sources | APA | IT & Computer Science | Coursework |
- Infusion of ICT into Teachers Training ProgramDescription: Section II of the Policy for Information and Communication Technology (ICTs) for Teacher Education defines four categories and competencies to be addressed when preparing for the infusion of ICTs into teacher training programs. Together, they represent a diverse collection of elements to be addressed when ...8 pages/≈2200 words| 4 Sources | APA | IT & Computer Science | Coursework |