SlideShare a Scribd company logo
1 of 43
3.4 ICT Strategy
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What is the difference between Archiving and backing up data?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],CIO & Central ICT Department Sales Production HR
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
 
 
 

More Related Content

What's hot

Implementing A CRM Proposal PowerPoint Presentation Slides
Implementing A CRM Proposal PowerPoint Presentation SlidesImplementing A CRM Proposal PowerPoint Presentation Slides
Implementing A CRM Proposal PowerPoint Presentation Slides
SlideTeam
 
Business Operational Challenges Powerpoint Presentation Slides
Business Operational Challenges Powerpoint Presentation SlidesBusiness Operational Challenges Powerpoint Presentation Slides
Business Operational Challenges Powerpoint Presentation Slides
SlideTeam
 

What's hot (20)

Clean Desk Policy
Clean Desk PolicyClean Desk Policy
Clean Desk Policy
 
Implementing A CRM Proposal PowerPoint Presentation Slides
Implementing A CRM Proposal PowerPoint Presentation SlidesImplementing A CRM Proposal PowerPoint Presentation Slides
Implementing A CRM Proposal PowerPoint Presentation Slides
 
Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)Piggy Backing & Tailgating (Security)
Piggy Backing & Tailgating (Security)
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Pitching Microsoft 365
Pitching Microsoft 365Pitching Microsoft 365
Pitching Microsoft 365
 
TCS 2020 CIO Study: Data Priorities & Practices
TCS 2020 CIO Study: Data Priorities & PracticesTCS 2020 CIO Study: Data Priorities & Practices
TCS 2020 CIO Study: Data Priorities & Practices
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overview
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Business Process Automation PowerPoint Presentation Slides
Business Process Automation PowerPoint Presentation SlidesBusiness Process Automation PowerPoint Presentation Slides
Business Process Automation PowerPoint Presentation Slides
 
Business Transformation PowerPoint Presentation Slides
Business Transformation PowerPoint Presentation SlidesBusiness Transformation PowerPoint Presentation Slides
Business Transformation PowerPoint Presentation Slides
 
Data security
Data securityData security
Data security
 
Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1
 
DEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTERDEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTER
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Introduction to Microsoft 365
Introduction to Microsoft 365Introduction to Microsoft 365
Introduction to Microsoft 365
 
Business Transformation Powerpoint Presentation Slides
Business Transformation Powerpoint Presentation SlidesBusiness Transformation Powerpoint Presentation Slides
Business Transformation Powerpoint Presentation Slides
 
Business Operational Challenges Powerpoint Presentation Slides
Business Operational Challenges Powerpoint Presentation SlidesBusiness Operational Challenges Powerpoint Presentation Slides
Business Operational Challenges Powerpoint Presentation Slides
 

Similar to 3.4 ict strategy

Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docx
todd581
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docx
glendar3
 
Case study on radio station
Case study on radio stationCase study on radio station
Case study on radio station
afira20
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence tools
smumbahelp
 
1) Business Process is a process of the set of activities which is u.pdf
1) Business Process is a process of the set of activities which is u.pdf1) Business Process is a process of the set of activities which is u.pdf
1) Business Process is a process of the set of activities which is u.pdf
shettysachin2005
 
Running head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT .docx
Running head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT              .docxRunning head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT              .docx
Running head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT .docx
cowinhelen
 

Similar to 3.4 ict strategy (20)

Computer systems management lecture 03
Computer systems management lecture 03Computer systems management lecture 03
Computer systems management lecture 03
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docx
 
Running Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docxRunning Head Operational Components1Operational Component.docx
Running Head Operational Components1Operational Component.docx
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
Case study on radio station
Case study on radio stationCase study on radio station
Case study on radio station
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence tools
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Why we need strategy for information system and information technology?
Why we need strategy for information system and information technology?Why we need strategy for information system and information technology?
Why we need strategy for information system and information technology?
 
1) Business Process is a process of the set of activities which is u.pdf
1) Business Process is a process of the set of activities which is u.pdf1) Business Process is a process of the set of activities which is u.pdf
1) Business Process is a process of the set of activities which is u.pdf
 
Mi0036 business intelligence tools
Mi0036  business intelligence toolsMi0036  business intelligence tools
Mi0036 business intelligence tools
 
IT planning evolution(1).pdf
IT planning evolution(1).pdfIT planning evolution(1).pdf
IT planning evolution(1).pdf
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
 
Santoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.pptSantoshdahal assessment2 s242842.ppt
Santoshdahal assessment2 s242842.ppt
 
Business intelligence and big data
Business intelligence and big dataBusiness intelligence and big data
Business intelligence and big data
 
Rakesh Roshan MIS Slides
Rakesh Roshan MIS SlidesRakesh Roshan MIS Slides
Rakesh Roshan MIS Slides
 
For Managers With Logo Sw
For Managers With Logo SwFor Managers With Logo Sw
For Managers With Logo Sw
 
Running head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT .docx
Running head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT              .docxRunning head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT              .docx
Running head HUMAN ELEMENTS IN IT STRATEGY DOCUMENT .docx
 
Dit yvol3iss13
Dit yvol3iss13Dit yvol3iss13
Dit yvol3iss13
 

More from mrmwood

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
mrmwood
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
mrmwood
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
mrmwood
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
mrmwood
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
mrmwood
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
mrmwood
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
mrmwood
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
mrmwood
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
mrmwood
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can provide
mrmwood
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
mrmwood
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
mrmwood
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
mrmwood
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
mrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 

More from mrmwood (20)

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can provide
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

3.4 ict strategy

  • 2.
  • 3.
  • 4.  
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.  
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.  
  • 42.  
  • 43.