Annotated Bibliography
The Annotated Bibliography provides a list of citations to a book, articles or documents which each citation is followed by a brief description or annotation. The purpose of the annotation is to provide readers relevance and accuracy of the cited sources.
Saylor.org. BUS303: Strategic Information Technology.
https://learn.saylor.org/course/bus303
The focus is on the allocation and use of technology resources across small organizations as part of the larger organizational strategy since smaller organizations do not have an unlimited supply of capital and must decide where to deploy new information technology. These organizations focus on not only when to deploy IT but whether they should deploy IT at all which leads to a bigger question related to IT as can the use of IT bring a competitive advantage to an organization?
IT Intel White paper, February, 2012. “Achieving Intel’s Strategic Goals with IT”. How Intel IT delivers value to the corporation.
An article describing Intel’s pace of business and technology transformation continues to accelerate which enables the organization to execute its strategy with IT across the board in addition to business, delivering scales, agility, efficiency and productivity.
Kyle Wang, Aug 8, 2017. Governance in Blockchain Part I: The Bitcoin Experiment. ITNEXT
https://itnext.io/governance-in-blockchain-part-i-the-bitcoin-experiment-a8c633791e6d
An article relating to IT Governance and Blockchain. The article discusses Blockchain technology as supposed to be as transparent as possible with minimal oversight.
ScrumAlliance. Your Quick Guide to All Things Scrum.
https://resources.scrumalliance.org/Article/quick-guide-things-scrum
Describing Scrum framework as one of the leading Agile frameworks. The article provides detailed information relating to understanding the scrum flow, benefits of using scrum, benefits of using scrum, scrum theory, difference between Agile and scrum, and how scrum helps organizations manage change.
Threatpost. Lindsey O’Donnell, March 11, 2020. More Than Half of IoT Devices Vulnerable to Severe Attacks.
https://threatpost.com/half-iot-devices-vulnerable-severe-attacks/153609/
Most organizations are aware that systems require to be secured to prevent attacks and data leaks from happening. It is important that organizations examine potential internal threats as they impose as much threat, if not more, than external threats. IoT is quite striking to organizations and has advantages that consist of: increased automation, efficiency, reduced cost and time consumption. IoT also provides a means for seamless communication between devices. Despite these benefits, there are still cyber threats present and susceptibilities. There have been increased incidents of cyber-attacks on devices that negatively affect user experiences and business functions of organizations. One study shows that 98% of IoT device traffic is not encrypted and the device’s network can be easily hacked. This provides easy access to the device’s installed software and/or admittance to protocol manipulation. Furthermore, inadequate security of installed software and network configurations was found to be a vulnerability to cybersecurity attacks.
Cisco. What is Cybersecurity?
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
Cyber Security can be defined as the process of protecting and recovering networks, programs and devices from any type of digital and cyber-attacks which are aimed at accessing, changing or destroying sensitive data or information causing tremendous amount of damages to normal business processes.
Balanced Scorecard Institute. What is a Balanced Scorecard? Balanced Scorecard Basics.
https://balancedscorecard.org/bsc-basics-overview/
The site describes a balance score card concept, history, evolution, and approach towards implementation. Balance score card descriptions are explained through simple diagrams where four perspectives of Balanced Scorecard, Financial or Stewardship\Customer & Stakeholder\Internal Process\Organizational Capacity or Learning & Growth, are clearly explained along with details regarding balance score care implementation and right performance management.
Governance Coach. What is Policy Governance? Policy Governance. A complete Operating System for Boards.
https://www.governancecoach.com/policy-governance/
An article provided by John Carver providing his focus on system of governance stating these days’ policy and governance will offer frameworks which allow efficient and effective governing methods. In this article, Strategic Planning Process Flow is clearly distinguished stating organizations make critical decisions due to their policies, certain limitations in determining objectives, and terms. The article explains these strategies to meet organizational goals and to maintain the governance system principles by protecting the roles and operational leadership in strategic planning to maintain the investments made in keeping those organizational plans.
ai:consortia. Why Does a Business Need a Strategy?
http://aiconsortia.com/2011/02/ac/why-does-a-business-need-a-strategy/
An article regarding existing strategies and how they provide aid in competitive changes when organizations drift away from their stakeholders and become noncompetitive within their environment and gradually stop making profit a process known as Strategic Drift 2. The main concern of the article is aimed at small businesses and their strategic plans and provides recommendations to adopt financial forecasting with their SWOT analysis. The article provides tools to aid organizations toward appropriate strategies to maximize shareholder values.
Duke University. Martin Schedlbaur. Requirements Prioritization Strategies.
https://www.corpedgroup.com/resources/ba/ReqsPrioritization.asp
The article gathers details pertaining to requirements prioritization process, what it is and how it works. The requirements prioritization is explained as a process of managing the importance and urgency of different requirements to endure with projects with limited resources. The process ensures the most critical requirements are addressed when time or budget runs out. This process requires the use of ranking schema used in practice to indicate importance of a requirement. The ranking schema will be decided by a project team at the outset of scope then a definitive scale is used triage requirements that are out of scope then a numeric scale is applied to further prioritize those requirements which are in scope.
GBR, Graziadio Business Review. Mark Chun. IT Matters: The IT Governance Road Map. 2005 Volume 8 Issue 3.
http://gbr.pepperdine.edu/2010/08/the-it-governance-road-map/
The article argues IT governance as an escalating issue for organizations struggling with leveraging IT to provide competitive advantages. The article focuses on the use of IT to create value, integrate information systems, and transform organizations. Action items are identified when establishing IT governance to aid management to support the organization in obtaining objectives and ensure proper alignment of business objectives with its goals.
Onthinkthanks. Think Thank Governance & Management.
https://onthinktanks.org/wp-content/uploads/2017/12/OTT_Series_GovMngmt_ISSUU.pdf
IT Governance describes how a decision’s made, who makes the decision, and how accountable the decisions are. This article argues that the IT Alignment, IT Strategies, and IT Governance are weak with four areas of explanations. These areas are developed with Val-IT framework which is used to create business value from IT investments. With the help of this framework consisting a set of guiding principles, processes, and best practices organizations can align their business with IT.