University of Maryland University College Investigate Literature for Selected Interest Area Paper – Description
Creating and Maintaining IT Policies
Lesson Introduction
Many organizations have the essential need to create enterprise policies that not only reflect the strategic direction and organizational goals but also reflect the direction the organization envisions in the projected future. One example is HR employee policies. Information Technology, as a supporting organizational unit, also must create policies for the proper use of information technology resources in use of the organizational units. These Information technologies (IT) Policies must refer to the corresponding standards and procedures to follow, plus responsible officers or users as part of each step of the procedure.
With the inclusion of technologies like mobile computing, social media use, and cloud computing as part of the essential media for operations, it has become critical for organizations to have a comprehensive framework to ensure that each department will have clear procedures for the creation and submission of policies into a policy repository. Over time, policies will likely require modifications, or they may become obsolete and need to be marked as such in the repository. In some cases, a policy board may need to approve new policies. New technologies like Internet of Things (IoT) and cloud computing, may require the evolution of policies to create new governing frameworks like Amazon Web Services Cloud Adoption Framework (AWS CAF), designed to build and execute a comprehensive plan for digital transformation (AWS, n.d.).
Every organization must appoint an officer or department in charge of policy formulation, implementation, and compliance assurance. Standards for policy naming, writing format and structure, and flow of review, approval, and deployment must be designed, approved by executive management, and communicated to senior management and departments who develop and manage policy. This department or officers responsible for policy formulation, evaluation, and management must design and manage their own roadmap for policy creation and have a standard policy and procedure describing all standards and formats for policies, standards, and procedures. This department is also responsible for the approvals from executive management in the case of policies and standards/procedures from executive management and departmental managers or directors.
Be sure to review this lesson’s resources carefully. You are expected to apply the information from these resources when you prepare your assignments.
Reference
Amazon Web Services. (n.d.). AWS cloud adoption framework (AWS CAF): Accelerating your cloud-powered digital business transformation. AWS. https://aws.amazon.com/professional-services/CAF/.
INVESTIGATE LITERATURE FOR SELECTED INTEREST AREA
instructions
Background
For this task, you will use the University library to perform research in your chosen problem domain of IT policy and strategy as part of IT Governance framework. Find 2 articles that involve some form of empirical research from the past 4 years. This could involve quantitative or qualitative methods. In addition, find 3-5 more articles that involve business journals and practical application of IT policy and strategy (Hint: Harvard Business Review is one example) also from the past 4 years. Make sure some of your articles have a global component. You will have located a total of 5-7 articles.
Instructions
Once you review the literature, summarize how the articles are related to each other. How are they similar? How do they differ? Then, conduct an analysis of findings across all of the articles? Are there any current operational and/or technical elements that are critical in today’s information technology landscape that is missing or not thoroughly discussed? What are your overall impressions from these readings in regard to the topic of IT Strategic and Governance formulation and implementation?
Your discussion should synthesize your findings by referring to the literature review conducted in your chosen problem domain. Do not summarize the articles. Instead, use them to inform yourself as you formulate a logical narrative that addresses the following:
Determine the type of research that exists. Be sure to address this question from both an academic (theory) and business (practice) viewpoint.
Identify three areas of interest to you from a theoretical standpoint.
Identify which key constructs, concepts, or variables are used in these articles.
Describe how the articles demonstrate innovative concepts in IT policy and strategy.
Explain how the articles collectively advocate for proactive research, evaluation, and implementation of new ideas.
Identify what you can draw upon in the articles that address beneficial and detrimental topics in IT policy and strategy for organizations.
Explain how the articles approach IT policy and strategy from a global perspective.
References
https://www.isaca.org/resources/cobit
https://www.iso.org/resources/publicly-available-r…
https://purplesec.us/resources/cyber-security-poli…
https://www.sans.org/information-security-policy/
The post University of Maryland University College Investigate Literature for Selected Interest Area Paper first appeared on .