A simple icon, consisting of a series of links surrounded by a circle, is a common symbol for a connection or hyperlink. The lines of the icon are outlined in a dark black color on the background, with the addition of military elements of the Saudi national identity such as the Ghutra, Shamaa, and Saudi Bisht, to reflect the distinctive local character of Qassim University.
Links to official Saudi educational websites end with edu.sa
All links to official educational websites of government agencies in Saudi Arabia end with .edu.sa.
Black leather minimalist gesture tag, black circular grip, topped with a clear depiction of a Saudi tunic with a shamma and aqal, emphasizing the features of the Saudi bisht. This design symbolizes the concept of security and digital data privacy and reflects the identity of Qassim University.
protocol for encryption and security. HTTPS for encryption and security.
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Digital Government Authority

Enterprise Architecture Office

An Overview

The office was established with an ambitious vision from the university leadership in 2020 to harmonize the services provided by the university in all its sectors with technical solutions and infrastructure to enhance the chances of achieving the university's goals and sustainability.

Vision

To be the core enabler of a pioneering digital university that is ready for future technological developments

Mission Statement

Designing a flexible, robust, and adaptable enterprise architecture that enables researchers and students across all faculties to have an advanced, efficient, and effective digital experience.

Objectives

  1. Digital transformation aligned with the business strategy: Ensure transformation initiatives are aligned with the strategic priorities of the business, based on clear plans to develop organizational capabilities.
  2. Selecting technology solutions based on an integrated governance system: Develop sustainable governance references that are used to evaluate and select technology solutions based on specific, standardized, and applicable governance specifications.
  3. Compliance, Governance and Transformation Readiness: Conduct periodic reviews of existing projects to achieve compliance with specific governance standards and specifications to ensure full readiness for transformation and value realization.
  4. Optimizing IT portfolios and realizing value: Conduct periodic assessment of IT portfolios to address any imbalance between existing technology solutions and established governance specifications to improve the quality of technology services, enhance business continuity, reduce total cost of ownership, and support return on investment (ROI).

Cookies

This website uses special cookies to ensure ease of use, improve your browsing experience, and clarify the terms and policies related to About user privacy. By continuing to browse this website, you acknowledge that you accept the use of cookies and the terms of the Privacy Policy