Sessions | Module Name | Contents | Reading Materials/ Cases / Handouts | Deliverables from students |
| 1-2-3 | What is IT strategy | - Introduction through a case study on IT strategy RPG Case Study – S1 - Where does IT strategy fit in organization –S2 - Case Study JPMC – S3 | RPG Case Study; Handout : Examples of vision statements;Ch.1 & 6 Murick, Ross & Claggett; Ch.7: O’ Brien & Marakas 2007; Ch.4 Wendy Robson | Discussion in the class on case study; |
| 4-5 | Evolution of IT strategy | - Role of IT Strategy as witnessed over years – S4 - Case Study – University – S5 | Handouts by faculty: How to get real business effect out of IT alignment; Ch. 4 Wendy Robson | Discussion in the class; |
| 6-7-8 | Need for IT strategy | - Discussions on vision, mission, organization strategy, e-biz. and e-application strategy; improving stakeholders satisfaction; re-engineering processes for ‘cutting edge’; agile organization – S6 - Case Study Infosys – S7 - Case Study Miracle Industries – S8 | Ch. 1&2 – O’ Brien & Marakas; Handout : Why IT Strategy? Ch.6 Murdick, Ross & Claggett 9need for a system view) | Discussion; |
| 9-10-11 | Factors affecting IT strategy Cross Functional Process Automation | - Case study in the class RECKITT BENCKISER – S9; - Guest Lecture from industry – S10 - Guest Lecture from Industry – S11 Process automation and role of IT strategy in core processes in an organization while interfacing with external world | Ch. 11, O’ Brien & Marakas; Ch. 5, Wendy Robson; Ch. 7 O’ Brien & Marakas ; Ch.7 Wendy Robson; Ch.10 & 12 Jaiswal & Mittal | Discussion in the class |
| 12-13-14 | Implementation of IT strategy | - Case Study – Arvind Mills – S12 (Presentation by Group 9 & 10) - Role Play *- S 13; - Workshop – S 14 | Case study – Crane Engineering; Ch. 11 O’ Brien & Marakas;Ch.8 Wendy Robson; Ch. 13 Jaiswal & Mittal | |
| 15 | IT Security | Role of IT security in IT strategy; integration with business goals (case: Security Strategy Implementation from chapter 9) | Handout : 1.Building an effective data protection strategy - 5 best practices; 2. 2006 IT Security Benchmarking report by Symantec | |
| 16 -17-18 -19-20 | Presentation on Major Assignment | - Groups 1, 2 – S 16; - Groups 3, 4 – S 17; - Groups 5, 6 – S 18; - Groups 7, 8 - S 19; - Groups 9, 10 – S 20 | Final presentation and report in soft copies |