Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
5 pages/≈1375 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 27
Topic:

Understanding IT Acquisitions and Its Aspects (Essay Sample)

Instructions:

WHAT ARE THE ONE OR TWO MOST CHALLENGING ISSUES IN IDENTIFYING AND DOCUMENTING IT ACQUISITION REQUIREMENTS. SHOULD IT BE PERMITTED TO ADD, DELETE, AND CHANGE REQUIREMENTS AFTER THEY HAVE BEEN APPROVED UP TO THE TIME CONTRACT HAS BEEN SIGNED WITH SERVICE PROVIDER AND SHOULD IT EVEN BE POSSIBLE DURING THE SUBSEQUENT PROJECT. WHAT WAS EASY OR DIFFICULT? AND WHAT PROBLEMS DID ENCOUNTER AND HOW DID SOLVE IT?

source..
Content:


IT acquisition aspects
Student’s Name
Institutional Affiliation
Course Name and Code
Professor's Name
Date
IT acquisition aspects
1 Challenges in identifying and documenting IT acquisition requirements
Information and technology is one of the most vital aspects which inspires efficient management of functions in organizations. Some of the challenges faced during the adoption of information and technology include failure of functions and meeting the needs of different users within the organizational settings. IT acquisition procedure is multifaceted; hence most organizations fail during the integration process.
* Failure of functions: In most cases, organizations focus on acquiring the most modern and effective technology in the market. Companies adopt effective IT budgeting and planning procedures (Schultz & Wydler, 2019) to acquire effective IT programs that suit organizational needs. During the process of IT, acquisition failures are likely to occur, affecting the effectiveness of the IT system. Strict IT security policies and compliance measures are likely to complicate IT acquisition hence causing failure. The challenges of IT failures can be minimized by adopting flexibility and developing clear guidelines. Organizations should adopt the spirit of flexibility to create room for the adoption of alternatives. Clear procedures and guidelines should also be adopted to help in reducing errors during the IT acquisition process.
* Meeting the needs of different users: Achieving the IT needs of diverse workers in the workplace is cumbersome. According to (Schultz & Wydler, 2019), most companies fail to meet the needs of all users due to high capital requirements. This challenge can be resolved through effective training of workers on the goals and objectives of the new IT system. Training employees on the goals and functionality of the new system reduces the cost of adopting IT tools that suit each worker.
2 Should it be permitted to add, delete, and change requirements after they have been approved up to the time a contract has been signed with a service provider? Should it even be possible to add, delete, and change requirements during the subsequent project?
Changing contract requirements during the IT acquisition procedure is a critical task that significantly affects the final project. Research by Erdogan & Tokgoz (2020) claims that contract changes should not be initiated after signing the contract. Adding, deleting, or changing contract requirements has a greater impact on the cost and quality of the IT project. For example, adding requirements after signing of IT contract leads to an increase in cost. New requirements to a signed contract attract additional costs to the contractor and client.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • The Importance of a Business Strategy
    Description: As the backbone of an organization's mission and objectives, the business strategy is an essential part of the business. Organizational, business, and information systems strategies must be aligned to enable business strategy to be effective. Businesses' strategies provide corporate and information system...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • The Activity of the Threat Agent
    Description: A threat agent is a person or object employed to transport, cause, convey, or assist a security risk. There are numerous distinct threat agents available in the computer science field, and their employment differs from period to period. Cyber-attackers utilize various threat agents to create different aims...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
  • What an Assessor Need to Understand Before an Assessment
    Description: When an applicant meets the required standards, an assessor will conduct a quality evaluation to see if they have met them. Assessors work in various sectors, such as purchasing, to assess the effectiveness, quantity, and value of the bought items or services. As with any other career,assessor should have...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!