Please can you answer this question Thanks Acquisition strat
Please can you answer this question? Thanks..
Acquisition strategy statements are important documents for gaining and maintaining executive support for programs and projects. What in your view are the one or two biggest challenges in developing an acquisition strategy? Give your reasons and any suggestions you have for addressing the challenge(s).
Solution
Solution:
The two biggest challenges in developing an acquisition strategy are:
Compiling of Information
It is one of the biggest challenge faced while developing an acquisition strategy because for compiling and gathering the concerned information for the acquisition plan includes the process of great coordination not only within the organization, but with government agencies and companies, other program documents etc. All this information should be systematically put together which is a difficult task.
Different Background of Users
Dealing with different kind of users and stakeholders is also a biggest challenge. The requirements of these users are diversified and complex. These complex and conflicting requirements turns into a challenge while developing an acquisition plan. If all these needs are not properly handled they can lead to several security problems. The situation will worsen more, when the organizational functions increases inturn increasing the burden on the technology to support more sharing of data and cross-functional activities.
To overcome the first challenge, initially the information available within the organization should be systematically processed so that the information coming from other resources can be accurately handled on time. The strategy lying behind the coordination with different companies should be build such that it only gathers relevant information for the organization. The compiling procedures should be clearly defined before the process of gathering information starts.
To deal with the second challenge, a proper procedure should be defined to understand and handle the diversified requirements of different users and stakeholders. It is necessary to understand these requirements closely to simplify the complexity of the diversified requirements. Special focus should be given to not to leave any loop holes that might be harmful for the security of the organization. Proper technology should already be there in place to handle the diversity of users and their requirements.

