Enterprise Architecture Program: Publications, Resources & Toolkit

Recommendations for Improved State IT Procurement

  • February 2016
  • Number of views: 8387
Recommendations for Improved State IT Procurement
The state information technology (IT) community has long called for improvements in IT procurement processes and practices and state chief information officers (CIOs) are consistently dissatisfied with the state IT procurement process. In the 2015 state CIO survey, The Value Equation, roughly one half (47%) of state CIOs expressed negative outlooks on IT procurement processes.Because of this consistent level of dissatisfaction, NASCIO is advocating for procurement reform by issuing a call to action to states.




About The Enterprise Architecture Program

The NASCIO Enterprise Architecture program was developed to enable the mission of state and local government. Government must continually reinvent itself to remain relevant by effectively and efficiently providing services to the citizens of this country. The path to this continual transformation must embrace leadership, management, coordination, communication and technology throughout government. Enterprise architecture is the discipline to appropriately define and leverage these capabilities within the complexities of government.

Funding to support the NASCIO EA Program and information sharing initiative is provided by a grant from the U.S. Department of Justice, the Bureau of Justice Assistance, Office of Justice Programs.

Enterprise Architecture Development Tool-Kit v3.0

October 2004

The enhancements in the third version of the Tool-Kit result from the expertise and continued dedication of enterprise architecture practitioners from all levels of government and the private sector. Version 3.0 incorporates an updated governance architecture framework with added roles and responsibilities and a focus on multi-level communication. Process models with explanatory narrative are included for governance and the architecture lifecycle. The Tool-Kit also includes fully populated security domain and application domain blueprints.