Diploma of Information Technology
SUBJECT 1: Analyse and Plan Security Requirements
Module 2: Match ICT Needs with Strategic Direction of the Organisation
Copyright
All material in this document or within this section of published material on the Equinim Hub is copyright ©
Equinim College 2024 except as outlined below, and may not, in whole or in part, and in any form or by any
means (electronic, mechanical, micro copying, photocopying, recording or otherwise) be reproduced, stored in
a retrieval system, published, transmitted or altered in any manner without prior written permission of the
copyright owner.
Version #01-20240111
LESSON 1: KEY SECTIONS OF AN ACTION PLAN FOR ICT IMPLEMENTATION PROJECTS
LESSON 2: EVALUATION AND PLANNING APPROACHES
Actions Plans
Introduction
IT DIPLOMA (CS) 1.2 - Match ICT Needs with
Strategic Direction of the Organisation
LESSON 3: EVALUATION OF COMPETING AND COMPLEMENTARY INTERNAL AND EXTERNAL ICT SYSTEMS AND PRODUCTS
LESSON 4: CURRENT AND EMERGING SYSTEMS AND PRODUCT TRENDS AND DIRECTIONS
ASSESSMENT
Define the Problem
Agree on Approach
Quantifying Risks
Implementation
Monitoring and Evaluation
Critical Incident Method
Methods of Evaluation
Cloud Computing
Apps
Automation
Big Data Analytics
Artificial Intelligence
Blockchain
Assessment
TOPIC 1 of 16
Actions Plans
Introduction
An ICT implementation project is a project that seeks to install and bring in new ICT
(Information communications technology). This requires an action plan so that
implementation runs smoothly and can be monitored and managed over a longer
period of time.
Define Clear Goals
Defining a goal that is clear as to what the outcome is that needs to be achieved.
Goal descriptions should include the outcome by the client and should describe
details of what the result should look like.
1
List Tasks or Steps
Next is to list out the exact tasks and steps that are required to achieve the goals.
This should be detailed and make sure it includes all steps that would be required.
The detail should be written as if it was written to another person, for ease of
reference and to ensure no information is left out.
2
Assess What is Most Critical and Prioritise
Define the steps and or tasks that are critical and or most important as well as set
priorities within the task’s lists. These are the things that need to be made sure
happen otherwise the project falls apart.
3
Assign and Set Milestones
Assigning the steps to the people who are responsible for those steps or tasks
including assigning self-responsibilities. Setting clear timeframes, deadlines and due
dates for each individual tasks.
4
Monitor and Review
Monitor to ensure that the tasks are being doing to the standard required including
are they achieving the goals or outcomes set out as well as are they being met in
the timeframe/deadlines required. Also, conducting reviews to see if things can be
modified or improved along the way.
5
Summary
Steps to an ICT Implementation Action Plan
Technical problems are common when working in the Information Technology
sector, in fact you could say that is one of the key reasons that IT professionals are
needed! Being aware of simple methods of evaluation and planning approaches to
these technical problems are key to keeping things straight forward and
manageable.
Likewise, strategic objectives are commonplace in an organisation that is continually
growing and progressing. The following topics are key methods and approaches
that will support you in both these areas.
TOPIC 2 of 16
Introduction
Where an issue exists, make sure that you define it correctly before you begin.
Similarly, to giving a diagnosis of a patient before treatment is commenced, you
need to ensure that where a technical problem exists, that a proper understanding is
given to exactly what, where and how the issue has occurred. Likewise, a strategic
objective first needs to come from an area that requires one – such as an area
within the organisation that is not working or where the potential for improvement is
seen – make sure this is clearly defined.
TOPIC 3 of 16
Define the Problem
Agree on the approach that needs to be taken in response to the issue or area of
improvement that is required i.e. What are the steps that need to be taken? What is
the plan of action? Who will be in charge of implementing and monitoring the plan
TOPIC 4 of 16
Agree on Approach
Assess and quantify any risks that may be involved in the agreed-on approach. Do
the potential benefits outweigh the potential risks?
TOPIC 5 of 16
Quantifying Risks
Implement the plan or take the necessary planned actions to now address and do
what is needed. During the planning phase, you would have nominated specific
people that will oversee doing this. Ensure that everyone involved is fully aware of the
details of what is needed.
TOPIC 6 of 16
Implementation
Monitor the plan’s implementation closely by using objective tools such as lists and
data comparison sheets. Check in regularly with people involved in the
implementation and monitoring process and make sure that you oversee all areas. If
a technical problem was what was addressed, check that it is now fixed and back to
working 100%.
TOPIC 7 of 16
Monitoring and Evaluation
Review incidents internal or external that support in similar context and allow a cross
comparison to occur.
TOPIC 8 of 16
Critical Incident Method
TOPIC 9 of 16
Methods of Evaluation
Methods of Evaluation
This is simply the way in which to weigh up options when looking at both internal and
external ICT systems and products. The following are some key methods you can
use:
Cost
Look at the cost of the ICT system or product as well as the workload associated with
operating it.
1
Risks or Potential Issues
Look at the risks or potential issues associated with the ICT system or product. Risks
may be in the way of health, legal, privacy or environmental. Be sure to evaluate all
of these in your comparison.
2
Capability and Performance
What can it do? What does it do? Does it perform well? Reading reviews from people
that have already tried and tested the system or product can support with this part
of the evaluation
3
User Friendly-ness and Integration
It may be amazing at what it can do but is it simple and user friendly? Will it be easy
to implement into the organisation and amongst staff?
4
Summary
Methods of evaluation of competing and complementary internal and external ICT
systems and products
Cloud computing is one of the most current trends currently on the ICT software front.
Cloud computing allows an organisation to keep all of its digital information and
resources in one designated place that can be accessed remotely if required. It is
also regarded for its ability to keep information safe.
TOPIC 10 of 16
Cloud Computing
Apps are a type of software that can be installed and run on a smartphone,
computer, or other electronic devices. Apps have grown enormously in popularity
over the last 10 years. And they have shown themselves to be almost limitless in their
various functions.
TOPIC 11 of 16
Apps
Automation has enabled processes to work faster and has been key in enabling
companies to reach their goals faster and more efficiently.
TOPIC 12 of 16
Automation
Big data analytics is the complex process of examining big data to gather important
information. Big data analytics is being implemented in numerous industries using
manufacturing, supply and large-scale production processes. It is a great method in
processing information more efficiently.
TOPIC 13 of 16
Big Data Analytics
Artificial intelligence refers to a field that combines robust datasets with computer
science to create a problem-solving intelligence. More of an emerging trend,
artificial intelligence is slowly growing and being developed so it can be more easily
implemented.
TOPIC 14 of 16
Artificial Intelligence
Blockchain is a digital database or ledger where digital asset data with encryption
are stored and chained together. Blockchain can be described as data you can only
add to, not take away from or change. Not being able to change the previous blocks
is what makes blockchain so secure. Therefore, blockchain is increasingly being
used for security purposes, and not just in relation to cryptocurrencies.
TOPIC 15 of 16
Blockchain
SUBJECT 1
Analyse and Plan Security Requirements
Module 2
Match ICT Needs with Strategic Direction of the
Organisation
Well Done!
You have now completed the LEARNING for this section.
What's Next?
You can now undertake the ASSESSMENT for this section.
TOPIC 16 of 16
Assessment
Click the RETURN button at the top right of your screen to go
back to your Module Home Page where you will find further
details.

IT Diploma (CS) - Match ICT Needs(0df11b236331cb436f789bd094e9e552).pdf

  • 1.
    Diploma of InformationTechnology SUBJECT 1: Analyse and Plan Security Requirements Module 2: Match ICT Needs with Strategic Direction of the Organisation Copyright All material in this document or within this section of published material on the Equinim Hub is copyright © Equinim College 2024 except as outlined below, and may not, in whole or in part, and in any form or by any means (electronic, mechanical, micro copying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system, published, transmitted or altered in any manner without prior written permission of the copyright owner. Version #01-20240111 LESSON 1: KEY SECTIONS OF AN ACTION PLAN FOR ICT IMPLEMENTATION PROJECTS LESSON 2: EVALUATION AND PLANNING APPROACHES Actions Plans Introduction IT DIPLOMA (CS) 1.2 - Match ICT Needs with Strategic Direction of the Organisation
  • 2.
    LESSON 3: EVALUATIONOF COMPETING AND COMPLEMENTARY INTERNAL AND EXTERNAL ICT SYSTEMS AND PRODUCTS LESSON 4: CURRENT AND EMERGING SYSTEMS AND PRODUCT TRENDS AND DIRECTIONS ASSESSMENT Define the Problem Agree on Approach Quantifying Risks Implementation Monitoring and Evaluation Critical Incident Method Methods of Evaluation Cloud Computing Apps Automation Big Data Analytics Artificial Intelligence Blockchain Assessment
  • 3.
    TOPIC 1 of16 Actions Plans
  • 4.
    Introduction An ICT implementationproject is a project that seeks to install and bring in new ICT (Information communications technology). This requires an action plan so that implementation runs smoothly and can be monitored and managed over a longer period of time.
  • 5.
    Define Clear Goals Defininga goal that is clear as to what the outcome is that needs to be achieved. Goal descriptions should include the outcome by the client and should describe details of what the result should look like. 1
  • 6.
    List Tasks orSteps Next is to list out the exact tasks and steps that are required to achieve the goals. This should be detailed and make sure it includes all steps that would be required. The detail should be written as if it was written to another person, for ease of reference and to ensure no information is left out. 2
  • 7.
    Assess What isMost Critical and Prioritise Define the steps and or tasks that are critical and or most important as well as set priorities within the task’s lists. These are the things that need to be made sure happen otherwise the project falls apart. 3
  • 8.
    Assign and SetMilestones Assigning the steps to the people who are responsible for those steps or tasks including assigning self-responsibilities. Setting clear timeframes, deadlines and due dates for each individual tasks. 4
  • 9.
    Monitor and Review Monitorto ensure that the tasks are being doing to the standard required including are they achieving the goals or outcomes set out as well as are they being met in the timeframe/deadlines required. Also, conducting reviews to see if things can be modified or improved along the way. 5
  • 10.
    Summary Steps to anICT Implementation Action Plan
  • 11.
    Technical problems arecommon when working in the Information Technology sector, in fact you could say that is one of the key reasons that IT professionals are needed! Being aware of simple methods of evaluation and planning approaches to these technical problems are key to keeping things straight forward and manageable. Likewise, strategic objectives are commonplace in an organisation that is continually growing and progressing. The following topics are key methods and approaches that will support you in both these areas. TOPIC 2 of 16 Introduction
  • 13.
    Where an issueexists, make sure that you define it correctly before you begin. Similarly, to giving a diagnosis of a patient before treatment is commenced, you need to ensure that where a technical problem exists, that a proper understanding is given to exactly what, where and how the issue has occurred. Likewise, a strategic objective first needs to come from an area that requires one – such as an area within the organisation that is not working or where the potential for improvement is seen – make sure this is clearly defined. TOPIC 3 of 16 Define the Problem
  • 14.
    Agree on theapproach that needs to be taken in response to the issue or area of improvement that is required i.e. What are the steps that need to be taken? What is the plan of action? Who will be in charge of implementing and monitoring the plan TOPIC 4 of 16 Agree on Approach
  • 15.
    Assess and quantifyany risks that may be involved in the agreed-on approach. Do the potential benefits outweigh the potential risks? TOPIC 5 of 16 Quantifying Risks
  • 16.
    Implement the planor take the necessary planned actions to now address and do what is needed. During the planning phase, you would have nominated specific people that will oversee doing this. Ensure that everyone involved is fully aware of the details of what is needed. TOPIC 6 of 16 Implementation
  • 17.
    Monitor the plan’simplementation closely by using objective tools such as lists and data comparison sheets. Check in regularly with people involved in the implementation and monitoring process and make sure that you oversee all areas. If a technical problem was what was addressed, check that it is now fixed and back to working 100%. TOPIC 7 of 16 Monitoring and Evaluation
  • 18.
    Review incidents internalor external that support in similar context and allow a cross comparison to occur. TOPIC 8 of 16 Critical Incident Method
  • 19.
    TOPIC 9 of16 Methods of Evaluation
  • 20.
    Methods of Evaluation Thisis simply the way in which to weigh up options when looking at both internal and external ICT systems and products. The following are some key methods you can use:
  • 21.
    Cost Look at thecost of the ICT system or product as well as the workload associated with operating it. 1
  • 22.
    Risks or PotentialIssues Look at the risks or potential issues associated with the ICT system or product. Risks may be in the way of health, legal, privacy or environmental. Be sure to evaluate all of these in your comparison. 2
  • 23.
    Capability and Performance Whatcan it do? What does it do? Does it perform well? Reading reviews from people that have already tried and tested the system or product can support with this part of the evaluation 3
  • 24.
    User Friendly-ness andIntegration It may be amazing at what it can do but is it simple and user friendly? Will it be easy to implement into the organisation and amongst staff? 4
  • 25.
    Summary Methods of evaluationof competing and complementary internal and external ICT systems and products
  • 26.
    Cloud computing isone of the most current trends currently on the ICT software front. Cloud computing allows an organisation to keep all of its digital information and resources in one designated place that can be accessed remotely if required. It is also regarded for its ability to keep information safe. TOPIC 10 of 16 Cloud Computing
  • 27.
    Apps are atype of software that can be installed and run on a smartphone, computer, or other electronic devices. Apps have grown enormously in popularity over the last 10 years. And they have shown themselves to be almost limitless in their various functions. TOPIC 11 of 16 Apps
  • 28.
    Automation has enabledprocesses to work faster and has been key in enabling companies to reach their goals faster and more efficiently. TOPIC 12 of 16 Automation
  • 29.
    Big data analyticsis the complex process of examining big data to gather important information. Big data analytics is being implemented in numerous industries using manufacturing, supply and large-scale production processes. It is a great method in processing information more efficiently. TOPIC 13 of 16 Big Data Analytics
  • 30.
    Artificial intelligence refersto a field that combines robust datasets with computer science to create a problem-solving intelligence. More of an emerging trend, artificial intelligence is slowly growing and being developed so it can be more easily implemented. TOPIC 14 of 16 Artificial Intelligence
  • 31.
    Blockchain is adigital database or ledger where digital asset data with encryption are stored and chained together. Blockchain can be described as data you can only add to, not take away from or change. Not being able to change the previous blocks is what makes blockchain so secure. Therefore, blockchain is increasingly being used for security purposes, and not just in relation to cryptocurrencies. TOPIC 15 of 16 Blockchain
  • 32.
    SUBJECT 1 Analyse andPlan Security Requirements Module 2 Match ICT Needs with Strategic Direction of the Organisation Well Done! You have now completed the LEARNING for this section. What's Next? You can now undertake the ASSESSMENT for this section. TOPIC 16 of 16 Assessment
  • 33.
    Click the RETURNbutton at the top right of your screen to go back to your Module Home Page where you will find further details.