Information Technology in Global Economy

profileWada Pav
Response5002.docx

Running Head: INFORMATION TECHNOLOGY 1

INFORMATION TECHNOLOGY 7

Response 1: BKE

I found the course informative because I understood more about technology and how businesses have adopted technology now. One of the topics that stood out to me is computer or internet policy. I was able to learn and come up with a policy that can be used in an organization. This exercise also made me understand the importance of having a robust policy in place. It is particularly crucial in an era where organizations have taken up the use of technology.  One of my most exciting reads was on big data. It is an area that I have always had an interest in, and I gathered more information.  For instance, I am now aware of how organizations use big data (Zhang, 2018). The most interesting readings I find during the course were business intelligence, blockchain, information systems, and digital transformation. These topics interest me a lot, and I want to learn more about them. Of course, I can feel a change in my perspective; before, I use to think about how could technology change the working of any business but now, I can say that after aligning the business with the IT strategies, the business can serve its customers in a more manageable way and can let the business earn more profits (Zhang, 2018).

This course has been eye-opening because I understood more about technology and how businesses take advantage of it. I now have a better understanding of the advantages and disadvantages of technology. One of the main issues surrounding the use of technology is the security (Pearlson et al., 2020). Security is the central down part of technology adoption in organizations. This is because unauthorized personnel can get into the organization's database and take the information they need. This can end up being very costly for organizations. I thought the topics of the course were well laid out. I also found them to be quite exhaustive. However, one of the areas that I would like more emphasis on is big data. This is because big data has become a common trend in organizations. It would be nice to understand how it is being used properly, its advantages and disadvantages, among others (Pearlson et al., 2020).

 

References

Pearlson, K., Saunders, C., Galletta, D. (2020). Managing and Using Information Systems: A Strategic Approach, 7th Edition. Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 978-1119560562.

Zhang, D. (2018, October). Big data security and privacy protection. In 8th International Conference on Management and Computer Science (ICMCS 2018). Atlantis Press.

Response 2

Among the different topics discussed in the course, Information technology in Global Economy, one strategy for global companies is outsourcing. In this discussion topic, I will evaluate Information Technology Outsourcing Strategies to Ensure Customer Satisfaction. Several initiatives often fail because of over-budget and not fulfilling client’s requirements. Managing client’s requirements by the off-shore team is not a simple task. The failed projects often lead to high business impact and clients’ projects delayed. When the project fails, stakeholders are also disappointed and lose trust in outsourcing (Rajack, 2019).

The dissertation paper focuses on multiple case studies and defines strategies that work best for firms in outsourcing. The paper surveys nine executives who are vastly experienced in outsourcing projects and defines their outlooks towards outsourcing. Two theories that dominate the paper are Stakeholder theory and transaction cost economics theory, which supported the conceptual framework in this study. Semi-structured surveys were used to accumulate data to make conclusions in the paper. Data analysis highlighted applicable frameworks, partnership strategies, strategic intent for outsourcing, and risk awareness. 

Using surveys, the research method based on quantitative data makes it a viable research topic for first-time research students. The research problem is rooted in literature as proven by the references, which are peer-reviewed papers and analyzes of multiple case studies. The paper is base on a conceptual framework rather than a theoretical model. 

 

References

Rajack, C. (2019). Information Technology Outsourcing Strategies to Ensure Customer Satisfaction [Doctoral dissertation, Walden University]. ProQuest Dissertations and Theses Global. https://www.proquest.com/dissertations-theses/information-technology-outsourcing-strategies/docview/2321830916/se-2?accountid=10378