ipl-logo

Information Technology Strategic Plan Paper

1395 Words6 Pages

Information Technology Strategic Plan YourFirstName YourLastName University title Information Technology Strategic Plan Overview of the Company Comet Company is a business entity seeking to make substantive entry into the competitive retail industry. Currently, the institution is based in New York but aims at making important inroads into other geographical locations in attempts to optimize the revenues and profit levels at the end of each operational period. The mission of the company is to offer quality, timely, and customer-friendly products and services in addressing the unique needs and expectations of our consumers. The vision of the company is to become the retail of choice for the residents of New …show more content…

Nonetheless, the firm has not been able to integrate the current technology into its operations in enhancing interactions or engagement with the consumers. The company believes on the optimization of the advantages or benefits of the modern technology concerning mobile apps, various social media platforms, and cloud technology to boost its operations in the achievement of the desired goals and targets. According to the management, the company will be able to achieve as high as $20 million annually in the revenues from the current $5 million upon infusion of the current technologies mentioned above. Based on this, there is need to enhance the awareness of the company on the potential benefits and implications of the IT through the development of the strategic …show more content…

The purpose of the personnel is to enable alignment of the plans, as well as operations of the information systems with the mission, vision, and strategic goals of the company. The practices include budgeting, strategic planning, and decisions for the information-system (Whittington, 2014). The CIO should work with other senior leaders in different aspects of the organization, thus, the need to show good communication and planning. Finally, there is a need for the information-security officer in charge of the integration of the information security policies while overseeing implementation of the policies. The objective of the officer is to ensure that the information remains valid, available, and secure against the potential internal and external

Open Document