INDUSTRY SPECIFICITY OF INFORMATION TECHNOLOGY DESIGN OF INVESTMENT COSTS FOR IT DEVELOPMENT

2021 ◽  
Vol 3 (11) ◽  
pp. 23-29
Author(s):  
Marat T. Turmanov ◽  

The article substantiates the provisions that the content of concepts, models and methods of sectoral management determines the specifics of the development of the entire IT management. Diversified legal norms and institutions today form a set of regulatory relations, one way or another related to the development and application of various IT

2018 ◽  
Vol 10 (3) ◽  
pp. 31
Author(s):  
Abdulla Awadh Abdulla Abdulhabib ◽  
Hassan Al-Dhaafri

The main purpose of this study is to investigate the effects of Training and Information Technology (IT) Management on Organizational Performance. Based on a theoretical foundation and a wide review of the literature, the model of the research was proposed.  To achieve the research purpose, this study has integrated different theories such as Resource Based View of the Firm (RBV), Knowledge Based View (KBV) in order to analyze the effect of Training and IT Management on Organizational Performance. 341 Questionnaires were distributed among random selected sample of Sharjah Police departments in Sharjah city in Emirates. 245 questionnaires were returned and used in the analysis using the SPSS system. The results of this study demonstrate that including Information Technology (IT) Management has positive and significant effect on Organizational Performance in Sharjah Police. This study reflects the importance of the right implementation to the Training and IT Management to have successful performance. This study also supported the premises of the resource-based view theory by reaffirming the importance of the including Training and IT Management to enhance organizational performance.


Author(s):  
Minodora Ursacescu

Since the 1990s, organizations have gradually become involved in the transformation of their information technology (IT) management process. In order to determine the direction of IT development in correlation with business needs, a consolidated management approach is imposed. This paper aims to provide a comprehensive assessment of the maturity level of IT management process in an organization. For this purpose, an empirical study in a Romanian public service company was done by using the benchmarking technique and Capability Maturity Model to describe the maturity level of IT management process. Four benchmarking classes, including a number of 24 benchmarks, were taken into account to focus on the main key issues - IT management strategy and IT planning; alignment of business strategy, IT strategy, organizational structure, and IT infrastructure; and information systems security management. The study reveals that the IT management process is mainly focused on technological dimension and less on the managerial one. It was observed that IT managers have a low awareness of managerial skills in planning, organizing, controlling, and leading the IT activities. Practical implication of the study presents two major issues: 1) on one hand, the need to approach a transversal vision in managing the IT process by aligning it to a complex set of choices, reflecting both a strategic and functional perspective and, 2) on the other hand, this study may be useful for managers looking to improve management of the IT department as well as the quality of their services. The study also indicates specific recommendations to refine the IT management process of Romanian companies.


2002 ◽  
Vol 16 (1) ◽  
pp. 7-30 ◽  
Author(s):  
Bruce Dehning ◽  
Vernon J. Richardson

Understanding the return on investments in information technology (IT) is the focus of a large and growing body of research. The objective of this paper is to synthesize this research and develop a model to guide future research in the evaluation of information technology investments. We focus on archival studies that use accounting or market measures of firm performance. We emphasize those studies where accounting researchers with interest in market-level analyses of systems and technology issues may hold a competitive advantage over traditional information systems (IS) researchers. We propose numerous opportunities for future research. These include examining the relation between IT and business processes, and business processes and overall firm performance, understanding the effect of contextual factors on the IT-performance relation, examining the IT-performance relation in an international context, and examining the interactive effects of IT spending and IT management on firm performance.


Author(s):  
Sue Conger

Historically, information systems (IS) programs have taught two of the three areas of information technology (IT) management: strategy and management, and applications development. Academic programs have ignored the third area, IT operations. IT operations management is becoming increasingly important as it is recognized as consuming as much as 90% of the IT budget and as acquisition of software becomes more prevalent than development of custom applications. Along with the shift of management focus to IT operations, standards such as the IT infrastructure library (ITIL) have been adopted by businesses to guide the development of processes for IT operations that facilitate evolution to IT service management. This shift to servitizing IT management, creates an opportunity for IS programs to align with business practices by innovating in the teaching of IT service management. Several methods of incorporating ITSM material into educational programs are explored.


Author(s):  
Vincenzo Morabito ◽  
Gianluigi Viscusi

Continuity could be and should be strategic for the business competitive advantage. Besides natural disaster, from blackout to tsunami, businesses face in daily activities critical challenges in IT management for assuring business continuity; for example, business continuity management results must be strategic, because of the infrastructural, organizational, and information systems changes that are required to assure compliance with regulatory norms (see, e.g., the impact of Basel II norms in financial sector), or must have and maintain a time-to-market advantage (disasters can facilitate competitors in a first mover perspective). Nevertheless, business continuity is at present often synonymous with risk management at the IT level, disaster recovery at the hardware level, or in the best case?at the data management level?with data quality management. These perspectives fail to unveil the strategic value of IT business continuity as a framework assuring alignment of strategy, organization, and systems, allowing a competitive advantage in a dynamic competitive environment. Moreover, even when business continuity, under these perspectives, has become one of the most important issues in IT management, there still appears to be some discrepancy as to the formal definitions of what precisely constitutes a disaster, and there are difficulties in assessing the size of claims in the crises and disaster areas. Taking these issues into account, we propose: (a) an analysis of the different facets of the concept of business continuity, and (b) an integrated framework for strategic management of IT business continuity. To these ends, we move from the finance sector?a sector in which the development of information technology (IT) and information systems (IS) have had a key impact upon competitiveness. Indeed, banking industry IT and IS are considered “production,” not “support” technologies. The evolution of IT and IS has challenged the traditional ways of conducting business within the finance sector. These changes have largely represented improvements to business processes and efficiency but are not without their flaws, in as much as business disruption can occur due to IT and IS sources. The greater complexity of new IT and IS operating environments requires that organizations continually reassess how best they may face changes and exploit these later for organizational advantage. As such, IT and IS have supported massive changes in the ways in which business is conducted with consumers at the retail level. Innovations in direct banking would have been unthinkable without appropriate IS, and merger and acquisition (M&A) initiatives represent the ideal domain to show what value can lead strategic management of IT business continuity. Taking these issues into account, we point out the relevance of continuity for maintaining customers, and time-to-market in complex and evolutionary competitive environments. Due the relevance of IT to maintain a valueadded continuity, our contribution aims to clarify the concept of IT business continuity, providing a framework, exploiting the different facets that it encompasses, and showing the strategic implications to the field of IS&T.


Author(s):  
Stephen H. Holden

Federal agencies rely extensively on information technology (IT) to perform basic missions. Arguably, public administration should be driving the theory, policy, and practice for managing these increasingly important resources. This is especially true as public organizations move to electronic service delivery to improve mission performance. However, despite some maturation in the literature for managing IT in federal agencies, public administration has contributed little to this effort. Other academic fields, such as information sciences, business administration, and practitioners, have done more to improve IT management at the federal level. This chapter analyzes federal IT management literature from several academic disciplines and government documents. The analysis compares federal IT management with a normative model of management maturity focusing on the strategic objectives for IT and related management approaches. Public administration’s lack of contribution to federal IT management raises profound questions whether federal agencies will be prepared for the information age. <BR>


Author(s):  
P. Partow-Navid

Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.


2008 ◽  
pp. 2745-2754
Author(s):  
Parviz Partow-Navid ◽  
Ludwig Slusky

Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.


2015 ◽  
Vol 3 (1) ◽  
pp. 166-177
Author(s):  
Diego Cordero

El presente artículo describe el contexto de los marcos de trabajo para las tecnologías de la información y áreas relacionadas en entornos organizacionales. Es importante disponer de una abstracción que permita ubicar la frontera en donde son aplicables estos marcos, conocidos también como “mejores prácticas”. Pues existen aquellos que tienen pertenencia sobre aspectos tecnológicos de TI (Tecnologías de la Información), están los que se usan en la operación de TI, los que sirven para administración de TI, aquellos que son de utilidad en el Gobierno de TI, los de uso organizacional y los que están relacionados con calidad y medio ambiente. Por la gran diversidad de marcos de trabajo disponibles para el entorno empresarial, a criterio del autor del presente artículo, es importante discriminar a qué tipo de problemática en particular se aplica cada uno de ellos y proporcionar al lector, entendimiento claro, ordenado y lógico de los mismos de modo que se contribuya a librar dudas y confusión de su aplicabilidad. Se inicia con una definición de “marco de trabajo”, para luego abordar en base a la literatura la matriz que conjuga su ámbito de aplicación (organizacional o de TI) y uso (prescriptivo, de directriz o evaluación). Abstract This article describes the context of frameworks for information technology and related areas in organizational settings. It is important dispose an abstraction that allows locate the frontier where these frameworks (also known as "best practices") are applicable. There are those who have membership on technological aspects of IT (Information Technology), are those used in the operation of IT, who serves for IT management, those that are useful in the Government, IT of organizational use and those related to quality and environment. By the diversity of frameworks available for the business environment, to the author of this article, it is important to discriminate what kind of problem particularly applies each and provide the reader a clear understanding, orderly and logical the same so as to help rid doubts and confusion of its applicability. It begins with a definition of "framework" and then address the literature based on the matrix that combines its scope (organizational or IT) and use (prescriptive, guideline or evaluation).


Sign in / Sign up

Export Citation Format

Share Document