| Sessions | Module Name | Contents | Reading Materials/ Cases / Handouts | Deliverables from students |
| 1-2-3-4 | What is IT strategy | - Introduction through a case study on IT strategy RPG Case Study – S1
- Where does IT strategy fit in organization –S2
- Case Study JPMC – S3 (Presentation by Group 1 & 2) | RPG Case Study; Handout : Examples of vision statements;Ch.1 & 6 Murick, Ross & Claggett; Ch.7: O’ Brien & Marakas 2007; Ch.4 Wendy Robson | Discussion in the class on case study; presentation by Gr. 1 & 2 |
| 5-6 | Evolution of IT strategy | - Role of IT Strategy as witnessed over years – S4
- Case Study – University (Presentation by Group 3 & 4) – S5 | Handouts by faculty: How to get real business effect out of IT alignment; Ch. 4 Wendy Robson | Discussion in the class; presentation by Gr. 3 & 4 |
| 7-8 | Need for IT strategy | - Discussions on vision, mission, organization strategy, e-biz. and e-application strategy; improving stakeholders satisfaction; re-engineering processes for ‘cutting edge’; agile organization – S6
- Case Study Infosys – S7 (Presentation by Group 5 & 6)
- Case Study Miracle Industries – S8 (Presentation by Group 7 & 8) | Ch. 1&2 – O’ Brien & Marakas; Handout : Why IT Strategy? Ch.6 Murdick, Ross & Claggett 9need for a system view) | Discussion; Presentation by Gr. 5 & 6; Presentation by Gr. 7 & 8 |
| 9-10-11-12 | Factors affecting IT strategy | - Case study by faculty RECKITT BENCKISER – S9;
- Guest Lecture from Oracle – S10
- Guest Lecture from Infosys – S11 | Ch. 11, O’ Brien & Marakas; Ch. 5, Wendy Robson; | Presentation by Group 9 & 10 |
| 13-14 | Implementation of IT strategy | - Case Study – Arvind Mills – S12 (Presentation by Group 9 & 10)
- Role Play *- S 13;
- Workshop – S 14 | Chapter 11 – Ranjana Kumar; Ch. 11 O’ Brien & Marakas;Ch.8 Wendy Robson; Ch. 13 Jaiswal & Mittal |  |
| 15-16 | IT Security | Role of IT security in IT strategy; integration with business goals (case: Security Strategy Implementation from chapter 9) | Handout : 1.Building an effective data protection strategy - 5 best practices;
2. 2006 IT Security Benchmarking report by Symantec |  |
| 17-18 | Cross Functional Process Automation | Process automation and role of IT strategy in core processes in an organization while interfacing with external world | Ch. 7 O’ Brien & Marakas ; Ch.7 Wendy Robson; Ch.10 & 12 Jaiswal & Mittal |  |
| 19-20 | Presentation on Major Assignment | - Group 1, 2 & 3 – S 17;
- Group 4,5 & 6 – S 18;
- Group 7,8 & 9 – S 19;
- Group 10 – S 20 |  | Final presentation and report on soft copies |