IT STRATEGY PLAN
<PROJECT NAME>
COMPANY NAME
STREET ADDRESS
CITY, STATE ZIP CODE
PROPONENTS:
1
TABLE OF CONTENTS
1. Introduction........................................................................................................................ 3
1.1 Executive Summary....................................................................................................................................3
1.2 Authorization..............................................................................................................................................4
1.3 Background.................................................................................................................................................4
1.4 Confidentiality............................................................................................................................................5
2. Strategic Assessment.......................................................................................................... 6
2.1 Internal Factors...........................................................................................................................................6
2.2 External Factors..........................................................................................................................................8
2.3 Market Spaces............................................................................................................................................9
2.4 Strategic Industry Factors...........................................................................................................................9
2.5 Objectives.................................................................................................................................................10
3. IT Strategy......................................................................................................................... 12
3.1 Perspective...............................................................................................................................................12
3.2 Position.....................................................................................................................................................12
3.3 IT Strategy Plan.........................................................................................................................................13
3.4 Patterns of Action.....................................................................................................................................14
4. Annex................................................................................................................................ 15
4.1 Glossary....................................................................................................................................................15
4.2 Bibliography..............................................................................................................................................15
2
Introduction
This section is devoted to provide overall information about the IT Strategy document for
The AI-Based Behavior Detection and Monitoring System for Library Management at
SUNN. It includes the objective, scope, description, and specification of the proposed IT
project.
1.1 Executive Summary
Start the IT Strategy document with a summary. The intention is that somebody who just
read the summary can get an understanding of the overall content of the document.
This document defines the Information Technology (IT) Strategy that must be followed
within the SUNN Library from the date of approval until the end of the year 2025. The
new strategy was created in response to a changing environment where library
management increasingly depends on efficient IT services to optimize resource utilization
and maintain academic integrity.
An assessment of the current situation and possibilities has been held to determine the
best course of action. As a result, three primary objectives have been defined:
● Implement AI-based behavior monitoring to enhance security and maintain
academic discipline.
● Integrate AI-driven analytics to optimize space utilization and study efficiency.
● Ensure compliance with data privacy regulations and ethical AI usage.
The vision and mission are as follow:
● Vision: The AI-Based Behavior Detection and Monitoring System is the primary
tool for ensuring a secure and productive study environment within the SUNN
Library, reinforcing academic excellence through responsible technology use.
● Mission: The AI-Based Behavior Detection and Monitoring System enhances library
management by detecting non-educational activities in real-time, optimizing study
spaces, and ensuring adherence to institutional policies.
3
The IT Strategy Plan calls for:
● Developing and training an AI model for behavior recognition.
● Deploying high-resolution cameras and GPUs for real-time monitoring.
● Integrating the AI system with existing library management software.
● Implementing a user-friendly dashboard for monitoring and alerts.
● Conducting training sessions for staff to operate and maintain the system.
1.2 Authorization
List here all persons that are signing the IT Service Strategy Plan document.
This document is authorized and agreed by the following key executives and stakeholders:
Name Position
Dr. Renante A. Edcas University President
CHED Representative Funding Partner
1.3 Background
Explain the events that led to the making of this strategy plan.
The SUNN Library has been providing IT-supported management services for academic
resources. However, challenges such as space misutilization, distractions from non-
educational activities, and security concerns have led to the necessity of adopting an AI-
based monitoring system.
Recent developments in AI technology have provided an opportunity to implement
automated surveillance systems that can enhance efficiency without compromising
privacy. The need for real-time monitoring and data-driven decision-making has driven
the adoption of this new IT strategy to align with the university's vision of a smart
academic environment.
4
1.4 Confidentiality
The IT Strategy should be a confidential document, but some parts are meant to be
public. Define here which parts must be confidential and which others must be shared
and to whom.
The IT Strategy should be a confidential document, but some parts are meant to be public.
Define here which parts must be confidential and which others must be shared and to
whom.
This and any other document describing the IT strategy must be considered highly
confidential. Only the top executives and the IT steering group should have full access to
the IT Strategy document set. Any other access, including public sharing, must be explicitly
declared inside the corresponding document.
Some parts in this document are intended to be of public access. They should be
distributed to employees and be shared with clients, partners, and suppliers. Sections
intended to be of public access are:
● Section 3.1. Perspective. It must be shared as “Vision and Mission.”
The top executives and the IT steering group must receive an encrypted copy of this
document through protected, internal mail with electronic signatures to guarantee the
confidentiality, integrity, and authenticity.
The information deemed public must be extracted and displayed on the university’s
website.
5
2. Strategic Assessment
The purpose of the assessment is to determine the service provider’s current situation
and what changes are likely to impact it in the foreseeable future. The assessment will
also highlight constraints that could tamper the ability of the service provider of meeting
its goals.
The objective of this step is to define a number of objectives that will be the primary input
to define the strategy.
The SUNN IT Service Unit is an internal provider giving service to the State University of
Northern Negros (SUNN). The provider’s main strength is its intimate knowledge of the
academic environment. The main disadvantage is that it lacks the scale and scope of
larger external IT providers.
2.1 Internal Factors
The goal in this sub-section of the IT Strategy Plan is to identify the strengths and
weakness of the service provider through an internal analysis.
The following internal factors have been identified:
● Existing Services. The SUNN Library currently offers manual supervision of student
activities. The new AI-Based Behavior Detection and Monitoring System will enhance
monitoring efficiency and reduce staff workload. It will automate behavior recognition,
send real-time alerts, and generate analytics reports, improving library operations.
● Financial Analysis. The project has a budget of ₱ 1,150,000 funded through SUNN's
technology development allocation and potential external grants. This investment aims to
reduce operational costs by automating monitoring and improving resource allocation.
● Human Resources. The library’s IT staff will undergo AI model training to operate and
maintain the system. This will improve their technical skills and ensure the system’s long-
term sustainability.
● Operations. The system will include real-time alerts and data analytics, enabling better
library management. It will streamline monitoring tasks, reduce staff workload, and
enhance resource utilization.
6
● Relationship with the Business Unit. The project is directly aligned with SUNN’s goal of
improving library efficiency and resource optimization. The system will provide insights to
enhance decision-making and policy adjustments.
● Resources and Capabilities. The system will utilize TensorFlow and YOLO models for
behavior recognition, along with high-resolution cameras and cloud infrastructure for
storage and processing.
● Existing Projects. The AI-based system is part of SUNN’s ongoing digital transformation
initiative, aiming to modernize library services and promote technology-driven efficiency.
2.2 External Factors
The goal in this sub-section of the IT Strategy document is to identify opportunities and
threats from the outside.
The following external factors have been identified:
● Industry and Market Analysis. AI-powered monitoring systems are increasingly used in
educational institutions to optimize resource utilization and enhance security. This trend
highlights the importance of adopting innovative technology to remain competitive.
● Customers. The primary beneficiaries are SUNN students and faculty, who will experience
improved access to study resources and a more conducive learning environment.
● Suppliers. The system will require high-resolution cameras, GPUs, and cloud services,
sourced from trusted vendors. Reliable suppliers will ensure the system's quality and
performance.
● Partners. Potential partnerships with CHED and other academic funding bodies will
provide financial support for the project’s sustainability and expansion.
● Competitors. No direct competitors, but the project ensures SUNN stays ahead in library
technology by adopting AI-powered solutions.
● Legislation and Regulation. The system will comply with Philippine data privacy
regulations, ensuring secure handling of student behavior data and adherence to ethical
AI practices.
o ISO/IEC 27000 Information security management.
o ISO/IEC 20000 IT service management.
7
● Political. The system will comply with Philippine data privacy regulations, ensuring secure
handling of student behavior data and adherence to ethical AI practices.
● Socio-Economic. The growing need for efficient resource management in educational
institutions makes AI-powered monitoring solutions more valuable and relevant.
● Technology. The system leverages TensorFlow and YOLO for real-time behavior detection,
providing accurate and efficient monitoring capabilities.
2.3 Market Spaces
Define here the spaces where the service provider can deliver value to its customer(s). Try
matching service lines or archetypes that can be offered with customer assets to be
serviced.
The “Investment Company” is the sole customer for the “IT Service Unit”. If authorized to
do so, services can be provided on a limited basis to other parts within the “Organization”
and even to external companies.
Location is not restricted; services can be provided to all branches of the “Investment
Company”. Branches are distributed nationwide, with two locations in foreign countries.
Market space includes all the current and potential IT services needed to address current
and future needs of the business unit.
Lines been served or under progress are: Communication, Accounting, Projects, Internet
and General Support. Potential lines to be supported are Providers and Financial services.
Some service assets from the Communication and Internet services may be transferred to
the corporate “Shared IT Service Unit” in order to abide to new corporate regulations
about IT safety.
2.4 Strategic Industry Factors
In this section of the IT Strategy Plan you should determine, for every market space,
which elements are considered critical factors to succeed (or fail) in the application of the
strategy. Start by understanding influencing factors like customer needs, business trends,
competition, regulatory environment, suppliers, standards, industry best practices and
8
technologies.
The most significant trend affecting the industry is the adoption of AI-driven monitoring systems.
Educational institutions are increasingly relying on AI-powered solutions to enhance security,
resource management, and operational efficiency. This trend promotes the automation of manual
processes, improving accuracy and reducing labor costs.
The regulatory landscape also plays a vital role. Compliance with data privacy laws (such as the
Philippine Data Privacy Act) is essential. The system must ensure proper data handling,
encryption, and secure storage of behavioral data to meet privacy regulations.
To remain competitive and ensure the project's success, SUNN Library must align its resources and
capabilities with industry standards by:
● Investing in advanced infrastructure: High-resolution cameras, GPUs, and cloud storage
for efficient data processing
● Acquiring robust AI models: Implementing TensorFlow and YOLO for accurate behavior
detection.
● Continuous staff training: Ensuring the IT team stays updated on AI technologies and
system operations
● Based on industry benchmarking, SUNN Library’s AI project is positioned as follows:
● Industry leader in library monitoring innovation due to real-time behavior detection
capabilities.
● Competitive in data analytics and reporting features, enabling data-driven decision-
making.
● Emerging in AI-powered resource optimization, with potential for further enhancement
through periodic system updates and feedback integration.
2.5 Objectives
The objectives are the output of the strategic assessment phase, and the input to the next
phase that is the generation of the strategy. Define here the objectives you intend to
fulfill with the strategy, driven by outcomes customers want to obtain. If there are too
many objectives defined, organize them into primary and secondary objectives.
The primary objectives to be obtained by the IT Strategy are the following:
a) By the second quarter of 2025, achieve the full integration of AI-powered behavior
monitoring into the SUNN Library Management System. This includes automated of
inappropriate activities and real-time alerts.
Final state: The AI system is fully operational and integrated with the library management
9
system, improving monitoring efficiency.
b) By the first quarter of 2025, enhance resources and capabilities by providing staff training
on AI model operations and data analytics interpretation. This aims to maximize the
system's effectiveness.
Final state: Staff members are proficient in using the AI system, ensuring smooth
operation and maintenance.
c) By the last quarter of 2025, establish a data-driven decision-making process by utilizing AI-
generated reports to improve library policies and resource allocation.
Final state: Regular analytics reports guide policy changes and enhance resource
management efficiency.
10
3. IT Strategy
There are four forms on which the strategy is presented: perspective, position, plan and
patterns. The strategy usually evolves through all four forms in some sequence.
In this section of the IT Service Strategy Plan you will define the strategy by each of its
forms.
3.1 Perspective
The perspective describes the vision and direction of the organization. The goal of
perspective is to define for customers and employees what the provider is, what it
provides and how it does it.
The most common way of defining perspective is by declaring the vision and the mission.
While the vision states what the provider intends to be, the mission states how the
provider will turn the vision into a reality.
Vision: The AI-Based Behavior Detection and Monitoring System is the primary tool for
ensuring a secure and productive study environment within the SUNN Library, reinforcing
academic excellence through responsible technology use.
Mission: The AI-Based Behavior Detection and Monitoring System enhances library
management by detecting non-educational activities in real-time, optimizing study spaces,
and ensuring adherence to institutional policies.
3.2 Position
Describe here how the service provider intends to compete against other service
providers in the market.
The AI-Based Behavior Detection and Monitoring System at SUNN Library will differentiate
itself by offering proactive security monitoring and data-driven insights, which most
traditional library management systems lack. Its real-time alerting capabilities and
detailed analytics reports will provide enhanced security and operational efficiency, giving
the library a competitive edge in technology adoption and service quality.
11
3.3 IT Strategy Plan
Describe the activities that the service provider shall perform to move from the current
situation to the desired situation.
The following high-level, strategic plan must be followed to successfully achieve the
strategic objectives defined on section 2.5:
a) AI-Powered Monitoring System Development and Integration, Enhance library security
through real-time AI behavior detection.
Objective(a)
Foreseen Completion Date: Second quarter of 2025.
Assigned Budget: ₱300,000.
b) Hardware and Equipment Acquisition, Procure and install high-resolution cameras and AI
processing units.
Objectives: b), c)
Foreseen completion date: First quarter of 2025
Assigned Budget: ₱350,000.
c) Software and Licensing Procurement, Obtain necessary licenses and AI software for the
monitoring system.
Objectives: b)
Foreseen completion date: first quarter of the year 2025.
Assigned budget: ₱200,000.
d) Infrastructure Expansion and Network Optimization, Improve server capacity and network
stability to support the AI system.
Objectives: c)
Foreseen completion date: last quarter of the year 2025.
Assigned budget: ₱200,000.
e) Staff Training and Development Program, train library staff on AI system management and
data interpretation.
Objectives: b), c)
Foreseen completion date: second quarter of the year 2025.
12
Assigned budget: ₱100,000.
3.4 Patterns of Action
Describe the ongoing, repeatable actions that shall be taken in order to continue to meet
the objectives defined for the strategy.
To ensure an efficient execution of the strategy defined in the previous section, the
following patterns of action must be adopted in response to changed conditions:
a) Certification: Staff will be certified in AI model operations.
b) Vendor Reliability: Technologies will be sourced from authorized vendors.
c) Project Management: Projects will adhere to PMI recommendations .
d) Quality over Cost: Service quality will be prioritized over cost-saving measures .
e) Offseason Implementation: Major changes will occur during the library's offseason
to minimize disruptions.
13
4. Annex
Insert here anything you may like to attach to support the IT Service Strategy document.
4.1 Glossary
This section of the IT Strategy Plan provides the definitions of terms, acronyms, and
abbreviations required to understand this document.
Term Definition
AI-Based Behavior A system that uses artificial intelligence to recognize and classify human behavior patterns in real
Detection time.
Analytics Reports A network of remote servers used to store, manage, and process data, enabling the system to operate efficiently and scale as needed.
Cloud Infrastructure The practice of ensuring that sensitive information is only accessible to authorized individuals or
groups.
Data Privacy The protection of personal data from unauthorized access, use, or disclosure, in compliance with
Philippine data privacy regulations.
Library A software solution used by libraries to manage book inventories, lending, and member records.
Management
System
Monitoring A graphical interface displaying real-time data and alerts, providing insights into library activities
Dashboard and system performance.
Outsourcing The practice of hiring external vendors to manage certain IT services or operations.
Real-Time Alerts Instant notifications triggered by the AI system upon detecting non-compliant or suspicious
behavior.
Stakeholders A statement defining the purpose and overall objective of the AI-based library monitoring
system, detailing how it will be achieved.
Service Catalog A database or document that lists available IT services, including descriptions, service levels, and
performance metrics.
Vision A forward-looking statement describing the desired future state or goals of the AI-based library
monitoring system.
Underpinning A contract between the IT service provider and third-party vendors, ensuring the delivery of
Contract external services that support the library system’s operations.
Vision A statement defining the purpose and overall objective of the AI-based library monitoring
system, detailing how it will be achieved.
Table 1. Glossary.
4.2 Bibliography
Philippine Congress. (2012). Republic Act No. 10173: Data Privacy Act of 2012.
Abadi, M., et al. (2016). TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems.
arXiv preprint arXiv:1603.04467
This free IT Strategy Template is brought to you by www.ProjectManagementDocs.com
14