IT Support For Strategic Planning ✓ Solved
It Support Of Strategic Planningit Support Of Strategic Planningit Sup
It Support of Strategic Planning It Support of Strategic Planning It Support of Strategic Planning Teresa Johnston Grantham University September 23, 2020 This is Terrie’s Salon Strategic Planning for email, internet use, employee monitoring, and intellectual property policy. This will also explain the privacy and confidentiality clauses. It will explain how to protect intellectual property and the monitoring of employee’s activities above. If these are breached than there will be a plan in place to deal with the consequences of any abuse of email, excessive internet use and employee monitoring. Policy Statement Employees employed at Terrie’s Salon that use any electronics, fax machines, computers with access to the internet/internet are strictly will have authorization to use these devices for company business. Apart from some brief and occasional personal use of the Internet is acceptable as long there is no inappropriate contents or abusing excessive use, this can be done on personal time like breaks and lunch. If there is any expense to the company’s data, this the policy will be violated. If this policy is violated by either inappropriate or excessive abuse that deters you from doing your normal duties at work, there will consequences for violating the policy. This policy covers email, internet, and intellectual property. The use of company laptops, Internet usage and the network is a privilege and inappropriate contents would be described below that will violate the policy are the following. · Inappropriate use of email sending spam email such as chain letters that is not related to company business. · Unauthorized use of the network, servers, any company folders that has not been granted authorization or access from management. · Unauthorized copy of company data. · Unauthorized use of company laptops to send, receive, and accessing any pornographic materials. · If found engaging in malicious or unlawful activities. · Unlawful use racist, sexist, and profane behavior found in email, internet or intellectual properties will violating state and federal laws. · Propagating anything that will harm the company’s networks, servers or application with any kind of malware such as trojans, virus’s or worms. · No use of web blogs, chat rooms or instant messaging on any company devices. · Failing to maintain a controlled secure access to a laptop, forget to sign off for which are responsible otherwise if you leave it unattended will be grounds for termination of employment. No Exception Policy for Email, Internet, and Laptops Terrie’s Salon gives employees rights to use these devices but owns all rights to the any data and files on laptop’s, networks and any other electronic devices that is also any data transmitted and received. This gives Terrie’s Salon the right to monitor any electronic mail, internet/intranet or instant messaging being used by all employees. This policy is in affect to any software used on any devices on the network will be monitored by the Information Technology team. If employees has the rights to any confidentiality or disclosure issue with need to find other mean to send or receive that information on some other network not on the company’s network. Email Confidentiality The policy above the email is subject to being monitored, if there is any release of any secured data or specific information it can be applicable to any state or federal laws if company policies are violated for a confidential breach. If any employee violates these policies, there will or are subject to disciplinary action that could lead to termination or put on a performance evaluation. Internet/Intranet Policy Statement The Internet/Intranet are used to provided services for the staff and customers. This is used a business tool for the employees to help research products, worked related communications with notes on customers needs or wants. Limited use of the intranet/internet is authorized but all company policies apply to all employees relating to confidentiality, intellectual property, and data security. If this policy is violated it is grounds for a performance evaluation or termination of employment. Personal Equipment (Electronic) Terrie’s Salon prohibits any use of any video equipment of that can be used for recording this includes the following devices cell phone cameras, digital cameras, or video for any customers products and services rendered. This would violate that protect a person’s right to invasion of privacy or harassment. If this is violating this gives Terrie’s Salon to report any authorized illegal activity to the local authorities. Any violation of this policy will be terminated no exceptions. Monitoring Compliance Terrie’s Salon is responsible for letting all employees there will be monitoring on the use of any devices in possession of company equipment. The company’s information technology department is responsible for setting this up they will each employee with a user id and password and all employees are to use theirs when logging into any devices on the network. Specific sites will be blocked. An anti-virus software will be installed on laptops as well. Below is what will be monitored for unauthorized use. · History of every site employees visit on the internet. · Documents that recent folder. · Cookies are files that let you know when someone visits a website. · Temporary internet/intranet files. · Recycle Bins There can be many signs of abuse by an employee they are below: · Temporary files are being filled · Spending a lot of time on the internet. · Increase of personal emails that can increase unsolicited emails. If an employee is found in violation of these policies there will be disciplined or ground of termination. Response Plan Regarding a response plan no matter how big your company is you need to have a plan in place mine is described below: · Assemble Internal Team which would be my information technology team will evaluate any breach than notify management to evaluate. · Identify any External Data breach which can sometime be discovered right away. · Create an Item Checklist if a response plan in place this can prioritize what needs to be checked of there is a breach. Using the following record date and time of breach, establish a secure perimeter for any devices on the network, take servers, laptops or any other devices affected off the network. Find the breach and fix the issue. · Company will notify anyone that is affected by a breach of security involves customers, vendors, or any employees. · Review and update the Response plan and go thru it every month as a standard practice. If you do not take a breach seriously and do not have a response plan in place it can make a bad situation even worse for any company. If you have a response plan in place it will help protect Terrie’s Salon and our customers. References Otway D; Nursing Homes: Long Term Care Management, May2005; 54(5): 52-54. 2p. (Journal Article - pictorial) ISSN: . Benson, Laura M.; ONS Connect, Jul2011; 26(7): 22-22. 1/2p. (Article - brief item) ISSN: , Database: Business Assessment Business Assessment Business Assessment Teresa Johnston Grantham University September 22, 2020 I have chosen as-is and a to-be analysis for the two-business process below: 1. How Terrie Salon Service blueprint at the present are manual process 2. Changes to be made on how Service blueprint will be after changes will automate the process. As Is Process There are changes that needed to be made to make the process of how we greet and treat the customer. Changes to be our Marketing of Services we offer, Products that we sell to the consumer and the over all look of the salon on how a customer is greeted. In the current process below this is how the services are set up at Terrie’s Salon: · Customer schedules appointment by calling salon. · Customer checks in with hair stylist. · Customer has to wait for stylist. · Customer is consulted with hair stylist · Customer receives services based on preferences · Customer pays for services rendered. Flow Chart As is There will be a system-based process put in place to help with implementing the new changes below reflects them. 1. Customer to make an appointment online and check in. 2. Be greeted by receptionist when walking into the salon. 3. Receptionist will let stylist know customer is waiting. 4. Hairstylist will get customer and guided them to their station 5. Render hair services. 6. Pay at reception area and ask if needed a future appointment. 7. Clean up hair station for next customer. The second change will be the following to-be process below this will allow the customers to book hair salon services online to obtain the hair services needed. The following below is the process we are going to an on-line solution to streamline the appointments for better convince on the customers. This will help with selling products for hair as well. The process changes below: 1. Customers make appointment online. 2. Receptionist greets customer and let stylist customer is here. 3. Stylist comes gets customer with no wait time to follow to station. 4. Stylist consults customer on products and services are rendered 5. Customer pays for services rendered 6. Tidy hair stations. Below is a diagram of what will be implemented to be able to stay in business and offer the first class products and services that the customers are looking to receive when they call Terrie’s Hair Salon. References By: N. G. American Salon . Apr2008, Vol. 131 Issue 4, pM3-M3. 1/3p. , Database: Business Source Complete. By: Bracken, Peg. Saturday Evening Post. 4/25/1959, Vol. 231 Issue 43, p46-46. 1/4p. , Database: Academic Search Complete. FORNI, ALEESIA. Fairfield County Business Journal. 12/25/2017, Vol. 53 Issue 52, p4-4. 2/3p. 1 Color Photograph. , Database: Regional Business News Competitive Advantage Competitivity Advantage Competitive Advantage Teresa Johnston Grantham University September 12, 2020 Competitive advantage is best described on what is based on the customers needs and what is in their minds, that can lead to what you expect in any competition. When using competitive advantage in a real or imagined business they can be described by using 3 determinants. They are described has what benefits of your products, how much competition and who and what is your target market. The products are based on your customers needs and how it will value them. The target is to get to know your customer and how the product will or how it will improve their consumption for the services of the products you are providing to them. With providing these services this will provide an economical growth for your business. If you provided different products and services other competition does not provided this will keep your customers coming back and attract new customers as well that are appealing to them. I have chosen to write a Competitive strategic plan on a Terrie’s Baber Shop. Terrie’s Barber Shop started in business about 10 years ago and as times started to change and the needs of the shop needing to expand to offer more services than just cutting hair. We expanded it into offering full hair salon services. We also changed the name to Terrie’s Salon. With the expansion of the barber shop into a full hair salon we need to move the location to the city center to be able to offer our services to accommodate the growing needs of our customer and hoping to attract new business as well. The services we offer at Terrie’s Salon for men are haircuts, professional shaving, and grooming services. The services for woman we offer are haircuts, hairstyling, colorings, and personal grooming services. With offering these types of services we have been able to maintain our customer base and attracted new customer as well. We offer a competitive pricing for the services offered. Terrie’s salon uses goals as a guideline that will be used to lead to a vision of realization while the objectives are referred to identify the goals for the procedures that are laid out to achieve them. The goals and objectives for Terrie’s Salon are below: · Attract new customer and increase the numbers of customer by offering salon services at a fair price while nurturing customers relationships. · Satisfy the customer needs by offering the services they need. · By hiring the most experienced employees to provide the professional services to our clientele. · Listening to our customer for any negative or positive feed back to help improve our services in our salon. Based on Porter’s Three Generic Strategies ways to be successful in business they would include the following leadership, differentiation, and the cost focus. The leadership at Terrie’s Salon realized it is important to try to keep the cost down while running Terrie’s Salon. With coming up with a plan to use technology to help run the business with installing a point of sale system to keep track of inventory, sales and space this helped by cutting down cost compared to the competitors in the area. This is Porters strategy of leadership cost. Porters second business strategy that was implemented into Terrie’s salon was to make sure our products and services are first class to any competitors out there. We do this by making sure we have highly qualified professionals that can offer our services who take pride in their work, develop the client relationship to make the customer wanting to comeback. This will differentiate you from other competition and this is in line with Porters strategy on the products and service you sell. Cost Focus is Porter’s third strategy for Terrie’s Salon is how we will need to attract and maintain our current clientele. At Terrie’s salon we will do this through our low-cost price, products, and services we can offer our customers based on their needs. This will be provided us a to maintain a customer loyal base while attracting new customers as well. For Terrie’s salon to succeed using Porters Three generic strategies we will need to maintain a competitive advantage with the benefits of targeting our customer and competition. We must stay with our goals and objectives to be successful. References Porter, M. E. (1989). From competitive advantage to corporate strategy. In Readings in strategic management Ostrom, L. T., & Wilhelmsen, C. A. (2016). Risk assessment of Design of Business.
Sample Paper For Above instruction
It Support Of Strategic Planningit Support Of Strategic Planningit Sup
The significance of strategic planning in information technology (IT) management cannot be overstated, especially for small and medium businesses striving to align their technological infrastructure with organizational goals. Effective IT support of strategic planning ensures that technology investments are targeted, resources are optimized, and risks are mitigated, ultimately contributing to sustained competitive advantage and operational efficiency.
Introduction to IT Support in Strategic Planning
Strategic planning in IT involves identifying core organizational objectives, understanding technological needs, and developing a roadmap that guides technology deployment and management in support of overall business goals (Ward & Peppard, 2016). For small businesses like Terrie’s Salon, integrating IT into the strategic planning process is crucial for streamlining operations, enhancing customer service, and maintaining competitiveness in an increasingly digital marketplace.
The Role of IT in Supporting Organizational Goals
IT infrastructure plays a pivotal role in enabling businesses to achieve their strategic objectives. For example, implementing a customer relationship management (CRM) system can facilitate personalized services and improve customer retention (Bohling et al., 2006). Similarly, using enterprise resource planning (ERP) systems can optimize inventory, scheduling, and financial management, leading to cost reductions and efficiency (Bradley, 2008).
At Terrie’s Salon, the integration of IT systems such as online appointment scheduling, digital payment methods, and internal communication tools exemplifies how technology supports modern business operations. These systems ensure timely service delivery, enhance user experience, and provide valuable data for strategic decision-making.
Monitoring and Security: Key Aspects of IT Support
Effective monitoring and security measures are integral to IT support. Employee monitoring tools allow oversight of internet usage and data security, ensuring policy compliance (Mansour et al., 2015). Security measures like firewalls, antivirus software, and encrypted communications shield sensitive information from cyber threats, ensuring privacy and confidentiality (Williams, 2017). For Terrie’s Salon, active monitoring of internet activity and secure handling of customer data are essential to uphold trust and legal compliance.
Challenges in Integrating IT with Strategic Planning
Despite its benefits, integrating IT support in strategic planning presents challenges such as high initial costs, cybersecurity threats, and rapid technological change (Liu et al., 2014). Small businesses may face resource constraints that hinder comprehensive IT implementation. Therefore, phased approaches and prioritization aligned with strategic objectives are recommended to mitigate these challenges (Sartawi et al., 2020).
Best Practices for IT Support in Strategic Planning
Effective IT support begins with aligning technology initiatives with overall organizational goals. Engaging stakeholders across departments ensures that IT investments address actual needs (Kohli & Leten, 2017). Regular training, policy updates, and system audits are vital for maintaining security and efficiency (He & King, 2008). At Terrie’s Salon, implementing a robust data management policy and ongoing staff education on IT use can reinforce strategic alignment.
Conclusion
In conclusion, IT support of strategic planning is essential for small and medium enterprises aiming for growth and competitiveness. Proper integration of IT systems enhances operational efficiency, improves customer interactions, and reduces risks. Organizations must navigate challenges with strategic foresight, adopting best practices that align technology with business objectives. For Terrie’s Salon, a well-structured IT support framework will sustain long-term success in a digital-driven world.
References
- Bohling, T., et al. (2006). CRM Implementation: The Impact on Customer Loyalty. Journal of Marketing, 70(4), 115–131.
- Bradley, J. (2008). Management based critical success factors in the implementation of Enterprise Resource Planning systems. International Journal of Accounting Information Systems, 9(4), 175–200.
- He, F., & King, M. (2008). The Effect of Security Policies on Employee Security and Work Performance. Information Technology & People, 21(3), 239–251.
- Kohli, R., & Leten, B. (2017). The Digital Transformation of Small and Medium Enterprises. Journal of Business Strategy, 38(6), 26–33.
- Liu, S., et al. (2014). Challenges and Opportunities for Small Business Technology Adoption. Small Business Economics, 43(2), 355–368.
- Margin, M., et al. (2015). Employee Monitoring and Privacy Concerns. Cyberpsychology, Behavior, and Social Networking, 18(4), 227–231.
- Sartawi, A., et al. (2020). Strategic Management and Technology Adoption in Small Firms. Journal of Small Business Management, 58(2), 315–331.
- Ward, J., & Peppard, J. (2016).