$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Funding And Strategic Alignment Guidance

tag 0 Download12 Pages / 2,807 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss about the Funding and Strategic Alignment Guidance.



The company which is taken into consideration is the STP Limited. The company is mainly running into a structure of problems in which their customer rings them in order to check the delivery of their product. Due to this reason the staffs ring all around the locations in order to get the solution of anyone having the part of order in stock. There was also a problem in the context that when a customer rings them for a particular product, the person concerned checks the product is available or not. In this way they see the item is in stock bout on the other hand when the customer comes to take the delivery the organisation sees that the item is not available because it may have been transferred to another location.

In order to eradicate the problem, the organisation is reinforcing upgradation in their information system with the implementation of a new control system for the stock, anew website and a management system which is for the customer.

The scope of the Project always needs to be very much multi – disciplinary i.e. it needs to support directly integration which is related to the prospective and the information about the project related to many disciplines. The IT also needs to cover the design concept of the products and the construction of the process (schedule) which is needed to carry out the project and reach the pre estimated goal of the organisation. The main concept which should be taken into consideration is that the design concept of the implementation is not completed until the product, the process and the organisation is designed and the understanding between the concepts is properly understood.

The main goal of the project is to establish a system of information technology which would directly help the organisation in achieving the strategic goal which are predefined. The main concern of the organisation is keeping the customers related to their business, improvement of the networking which is related to the organisation and keeping the data of the organisation in a secured manner away from breaching. The main concern factor that is related to the organisation is that the employees are not highly skilled when relating to use of nay information technology. The main strategic goal which is set for the organisation for which the implementation for the information technology aspect is being introduced is to help their employee exceed the sales growth.


Strategic alignment of project

The concept of the strategic alignment of the project is directly related to the concept of prioritization. Periodization is one of the abilities which can be termed as a key ability that drives the project towards the goal of the organisation (Borlase, 2016). It is very much essential for the organisation to know what sort of business they are dealing in specially knowing what are the project drivers in the thriving towards the goal of the project. There can be lots of project drivers which may help in moving towards the goal of the organisation. The concept which should be taken into consideration Is the alignment concept of the project with the drivers in order to achieve the goals. Some of the most common example which are related to the topic are:

  • The time to market the business: This may be related to the marketing of the product at the right time in order to catch the attention of the users
  • Improvement of the quality of the product: This is directly related to the client. if the product which is delivered to the client is of quality then the client would always demand service from the organisation.
  • Maintenance cost saving relating to the post selling: the maintenance cost after the release of the product to the client should be considered in the main budget of the project.
  • Assurance of the customer satisfaction: customer satisfaction should be the main motive of any organisation in order to achieve goals of the organisation.
  • Increase of the share in the market.

Network security

Securing the data is a very important aspect which should be taken into consideration by any of the organisation. Two strong arguments can be stated for the protection of the data are protect the privacy and avoid of the identity theft. The points that should be taken into consideration are:

  • Protect with password: This may seem very much unfamiliar but most of the cyber-attack are successful due to the fact that the password protocol which was set was very much weak. The access to all the wireless network, equipment’s and the data which are sensitive should be guarded with strong password so that any unwanted user cannot crack the code and get access to it.
  • Safe design system: Limiting the access to the technology infrastructure can directly reduce the exposure which is given to the thieves and the hackers. It should be taken into consideration that the scope of the potential damage into the organisation network is minimized by the implementation of a unique set of email address, servers and domain name with would be related to each of the users, department and work groups.
  • Basic training requirement: There are number of security breaches that mainly occur due to human activity or carelessness. A creation of a culture which is corporate should be created by means of training that directly deals with the aspect of the risk which is associated with practise of sloppy password and on the other hand the careless use of program, networks and devices.
  • Avoid of the unknown email: Clicking of unwanted mails and with it the attachments which the mail contents could directly expose the system with virus, programs which are Trojan and computer worms. Before opening any mail attachments, it should be taken into consideration to contact the email sender in order to confirm the message which is content in the emails.
  • Keeping the data which is sensitive out of the cloud: Cloud computing can offer many benefits to the organisation with it the aspect of time saving as well as money saving. But on the other hand the technology may pose threats which are additional as the sensitive data are housed on a server which is located at a remote location. This data is mainly operated by a third party who may have issue with the security. It should be taken into consideration that most of the cloud providers are infants, so it would be appropriate correct decision to keep the sensitive data under the own control of the organisation so that data breach of loss of data is not encountered (Prabhakar, 2017).

Mobile device security

Organisations should always take into consideration that the value of the mobile devices can add advantage for the employees. This mainly give them the access to the resources which are related to the business from anywhere and at any time. The concept has not only brought a reshaping in the traditional in task which are related to the in- office but also the organisations are devising a way which is entirely new and highly advanced. On the other hand, it can be stated that there are many threats which are associated with the concept. Following are few threats which can be directly be associated with the technology of the mobile device.

  • Data leakage: Many a times the mobile device is stolen or lost. This is incorporated with leaking of data into the hand of sometimes who may use the data for their own personal benefit and gain advantage from it. The user of the mobile in the first hand had trusted the device in order to keep the sensitive data in the system but it may result in a huge damage to the user as well as the organisation.
  • Unsecured Wi-Fi: The free Wi-Fi network which is sometimes readily available in order to indulge in activity related to the mobile, it can be highly unsecured from the end of the user. The user can be easily being hacked by the technology and have the data stored in the mobile being breached which is directly being held by someone else.
  • Phishing activity: Since the mobile devices are always on the can be indulged in front line of the phishing activity. The phishing activity can be termed as an activity which is done on any networked device in order to gain access to the sensitive information.
  • Network spoofing: Network spoofing can be related to the activity which can be done on mobile device or any networked device in which the hacker tends to create an access point which is fake (which may look like a Wi-Fi network). This is done in high traffic regions for example coffee shops where the user tends to use the free internet connection and fall into the trap of the hackers (Téllez & Zeadally, 2017).

The security aspect when related to the use of mobile device in order to access business information should always be taken into consideration.

  • Mobile devices always need antimalware software in order to safe guard the system from malware activities.
  • Encryption of the device should be in corporate due to the factor that communication which is related to the wireless are very much easily to intercept and snoop into the device.
  • Password set up for the device should be always on the high end that no unwanted user can get the direct access to the device as well as the data which is stored in the device as a whole.
  • At least ones a year any organisation which is related to this form of technology should hire a reputable security farm in order to perform security test on the device. Such actions could directly reduce the mitigation and remediation aspect which is related to the technology.

Plan for hardware purchases

The plan of the hardware purchase is a very important issue when related to any organisation. there are mainly three things which should be taken into consideration while implanting the plan of the purchase they are.

  • Quality: the quality of the product is a very important issue. Few question that should be included during the quality check are.
  1. How well does the product match the requirement of the organisation?
  2. Does it contain the features that the organisation wants?
  3. How well is the product made
  4. How long would the product service (Chandrasekaran & Bittau, 2017).
  • Price: everything has a budget involved in it. It should not be taken into account that buying product would directly reduce the overall budget which is related to the concept. After all, buying something which is cheap and does not serve the purpose of the purchase would result in replacing of the product which would mean a budget loss
  • After sales service: the after sales service is also a very important issue which can be also be related to the maintenance part of the product in order to gain advantage of the product.

Business continuity

The business continuity aspect directly states the functions which are very much essential. Identifying the processes and the system’s must be sustained and the detailed view on how the maintaining part is introduced should be taken into account. Business disruption which can be enforced in many ways should also be considered. Taking into account the risk which are ranged in the form of cyber-attacks to human error to natural disaster is very much vital for any organisation in order to obtain business continuity plan in order to perceive its reputation and the health of the business (Koen, Von Solms & Gerber, 2016). A plan which is related to the business continuity according to a business consultant expert Paul Kirwan should have the following items:

  • Initial data which is related to the important information about the contacts located should be taking into consideration at the first point.
  • Revision of the process of the management that mainly describes the change management procedures.
  • Scope and the purpose.
  • Emergency management and response.
  • Step by step procedure.
  • Flow diagram of the organisation and checklist related to the agenda of the organisation.
  • Scheduling of the testing, reviewing and the updating of the plans (Ramalingam, Carr & Walsh, 2016).

The steps which can be implemented for the organisation in order to execute proper business continuity plans are:

  • Initiation of the project is done
  • The gathering of the information is done which mainly features the aspect of business impact analysis (BIA) and the assessment of the risk
  • Plan development
  • Plan testing, updating and the maintenance sector.

Risk management

There are many factors which can be related to the successful management of the risk management which are discussed below:

  • Internal check is conducted continuously: the criminals which are termed as Cyber criminals can attack the spots which are considered to the vulnerable any time, so in order to stop the activity continuous monitoring should be done within the organisation’s network in order to reduce the overall chances that the criminals will get far into the system.
  • Segmentation of data from network and other functions of the business: ones the criminal has access to the system they tend to search of nodes and ways in order to gain money out of the business body. The separation of the system would make it easier to detect the criminals and also restrict them in a proper time.
  • Organisation collaboration with others: the cyber criminals tend to target all types of organisation and business, so by creating a means of communication would directly create a community that mainly checks for report of any attack, intrusion activity and locate the direct sources from where the attack is generated (Glendon, Clarke & McKenna, 2016).

However, it can be stated that most of the attacks are more or less somewhat predictable. The cyber criminals use the method which is same in order to enter the system and gain the overall access of the system and steal data or money. The most common entry method is mainly through employees allowing access (15% of attacks), devices which are stolen (13%) and the system of the organisation which is in the supply chain (14%) (Almeida, Hankins & Williams, 2016).


It can be concluded from the above report that the company movement towards the IT framework would be very much beneficial taking into consideration the overall benefits which are involved with the technology. By the implementation of the technology the organisation can achieve the concept the business continuity and the ability to achieve the client keeping aspect and overall growth of the business and its overall working within and outside of the organisation.


Recommendation 1: The company should give proper training to the employee in order to utilize the concepts of the business and the advantages that are related to the concept

Recommendation 2: The implementation of the software should be tested and the maintenance of the software should be done in order to achieve the proper working of the software’s.

Recommendation 3: The overall budget of the implementation should be taken into consideration so that fail of budget is not encountered after the implementation of the process is done.



Alec Cram, W., Kathryn Brohman, M., Chan, Y. E., & Brent Gallupe, R. (2016). Information systems control alignment. Information and Management, 53(2), 183-196.

Almeida, H., Hankins, K. W., & Williams, R. (2016). Risk management with supply contracts. The Review of Financial Studies.

Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks and an Ethernet-based network security monitor.

Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks and an Ethernet-based network security monitor.

Borlase, S. (Ed.). (2016). Smart Grids: Infrastructure, Technology, and Solutions. CRC press.

Chandrasekaran, G. P., & Bittau, A. (2017). U.S. Patent No. 9,628,452. Washington, DC: U.S. Patent and Trademark Office.

Glendon, A. I., Clarke, S., & McKenna, E. (2016). Human safety and risk management. Crc Press.

Koen, R., Von Solms, R., & Gerber, M. (2016, May). ICT Readiness for Business Continuity in local government. In IST-Africa Week Conference, 2016 (pp. 1-11). IEEE.

MacLeod, M. A. (2016). The role of risk management in business continuity: A generic qualitative inquiry of information technology managers (Doctoral dissertation, Capella University).

Nguyen, H. D., & Steele, G. C. (2016). Funding and Strategic Alignment Guidance for Infusing Small Business Innovation Research Technology Into Science Mission Directorate Projects at Glenn Research Center for 2015.

Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India.

Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India.


Ramalingam, H., Carr, M., & Walsh, P. J. (2016). U.S. Patent No. 9,386,507. Washington, DC: U.S. Patent and Trademark Office.

Téllez, J., & Zeadally, S. (2017). Mobile Device Security. In Mobile Payment Systems (pp. 19-33). Springer, Cham.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Funding And Strategic Alignment Guidance. Retrieved from

"Funding And Strategic Alignment Guidance." My Assignment Help, 2018,

My Assignment Help (2018) Funding And Strategic Alignment Guidance [Online]. Available from:
[Accessed 04 June 2020].

My Assignment Help. 'Funding And Strategic Alignment Guidance' (My Assignment Help, 2018) <> accessed 04 June 2020.

My Assignment Help. Funding And Strategic Alignment Guidance [Internet]. My Assignment Help. 2018 [cited 04 June 2020]. Available from: is an Australia-based assignment help services that aims to fulfill students' requests 'can someone do my assignment online'. We have hired best-qualified and experienced assignment helper to assist students in crafting premier quality academic papers. Students are guaranteed to receive high-quality assignment writing assistance at an affordable price. This is why, we are considered as the best assignment solver.

Latest Management Samples

BMA735 Management Ethics

Download : 0 | Pages : 3
  • Course Code: BMA735
  • University: University Of Tasmania
  • Country: Australia

Answer: Coles to pay $2.5m for misleading "Baked Today" and "Freshly Baked In-Store" bread promotion The main issue identified in Coles Supermarket is the underpayment of the workers and for the wrongful claim of ‘freshly baked’ products when the case was not such. The workers are being underpaid due to the controversial deal that the supermarket signed with SDA (Shop, Distributive and Allied Association of Employees) and for sell...

Read More arrow Tags: Australia 9 Manaagement Ethics University of Tasmania 

BUSS2054 Logistics And Supply Chain Management

Download : 0 | Pages : 16

Answer: Business report about supply chain management Introduction Supply chain management is the control of the movement of goods and services (Jaswal, 2018). It involves the action and the storage of raw materials. Supply chain management also deals with the flow of inventory under work in progress and finished goods from their original point to the point of consumption. Supply chain management has also been defined as the designing, plann...

Read More arrow Tags: Australia 31 Principles of Logistics and Supply Chain Management University of South Australia 

ACC201 Financial Accounting For Group Operations And Energy Markets

Download : 0 | Pages : 6

Answer: Expense is the budgeting and accounting term that is commonly used for mentioning any spending. It is the reduction in owner’s equity takes place due to usages of the assets for generating revenue and for other activities it is the part of the company’s operation. AGL Energy Limited is the integrated energy company that provides gas, electricity and associated products, services to business and wholesale customers all over ...

Read More arrow Tags: Australia Belconnen Management University of New South Wales 

GEOG8012 Development Problems And Solutions

Download : 0 | Pages : 2
  • Course Code: GEOG8012
  • University: Flinders University
  • Country: Australia

Answer: The following discussion is based on how cash transfer in India works to reduce and helps the present and future poverty conditions. According to the 2019 ratio, nearly 17% of India’s population is poor (Alexander, 2019).   The purpose of cash transfer is to provide social security to the poor households. Cash transfers which had been initiated by the government helps in the life of poor people by providing the cash di...

Read More arrow Tags: Australia Development Problems and Solutions Federation University 

BUMGT5922 Effective Business Communication

Download : 0 | Pages : 3
  • Course Code: BUMGT5922
  • University: Federation University
  • Country: Australia

Answer: Introduction This presentation will discuss: Scope of Communication Components of Communication Communication Styles Different styles of communication Benefits of understanding communication styles Quality of communication in a good leader Summary Scope of Communication Communication refers to interchange of information between two or more people. It is with the help of communication that in...

Read More arrow Tags: Australia 9 bumgt5922 Federation University 

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1265 Order Completed

97% Response Time

James Cook

Masters in Management

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2279 Order Completed

97% Response Time

Zachary Perez

PhD in Computer Science and Information System

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

First time using My Assignment Help Services - First meeting with customer service was very thorough and spent time explaining. Once hired and explained what I needed, I received exactly what I had asked for. The assignment was sent to me before th...


User Id: 436537 - 04 Jun 2020


student rating student rating student rating student rating student rating

Good Job - provided exactly what I asked for. Addressed all questions in the assignment. APA formatted with references within the past 5 years. Assignment finished before the time I asked for it.


User Id: 436537 - 04 Jun 2020


student rating student rating student rating student rating student rating

Finally a wonderful work ! Satisfied by rework after escalation as expected revived the solution! Would definitely recommend my friends! Thanks


User Id: 332636 - 04 Jun 2020


student rating student rating student rating student rating student rating



User Id: 240291 - 04 Jun 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?