Information Technology IT Management Term Paper

¶ … society nowadays is filled with products of innovations in information technology (IT). From instances of just spending your leisure time up to spending time at work, we almost never missed to use products that successfully exist because of IT. For instance, ATMs exist because of IT. We can easily communicate with each other through cell phones through some help of information technology. Among the most important roles played by IT is in the management of a business. Almost every business nowadays utilizes IT as the managing foundation of their operation. Hence, it will be no wonder if the roles played by IT professionals are as essential as the successful operation of IT in businesses.

A career in information technology management has been a major factor in bringing more success to a business. Without the help of IT professionals, the advanced technologies that exist, such as the computer networks, the Internet, and many others, will be useless. In view of this, this paper will try to briefly explore the careers in the field of information technology management. It will discuss how a career in IT works as well as the roles that a career in IT really plays. With the help of some information gathered from an interview with an IT professional, this paper aims to discuss the real happenings in the career world in IT.

The Roles Performed in a Career in Information Technology

As computing continually grows, the role of information technology...

...

Along with this change demands the continuous update of knowledge and skills in computing for professionals who manage information technology. This is essential to enable them to effectively handle the challenging IT developments.
The roles played by the careers in the field of information technology differ. There are various positions for an IT career like Programmer, Analyst, Database Administrator, and many others. Nowadays, a career in IT does not only mean being knowledgeable in computing, but also having to possess multi-disciplinary skills. Australian Computer Society (2002) indicates that Information technology professionals are no longer remote technocrats, but have become members of multi-disciplinary teams of problem solvers. There is a growing emphasis on communication skills to go with technical knowledge and problem solving ability.

An interview I had with an IT manager from a software house company described how a career in IT management works. According to him, the basic and most essential commitment in managing IT responsibilities is an individual's enthusiasm for a continuous update of his IT skills and knowledge. This is important because IT never runs out of new developments. Similar to ACS's view of multi-disciplinary skills in IT, he also stated that aside from computing, another duty in managing IT responsibilities is the ability to communicate with clients. This is due to the reason that most systems and applications…

Sources Used in Documents:

Bibliography

Careers in Information Technology.

Australian Computer Society, Inc. 21 July 2004. http://www.sa.acs.org.au/careers/sacit02.pdf

Malhotra, Yogesh. Role of Information Technology in Managing Organizational Change and Organizational Interdependence. 1993. BRINT. 21 July 2004. http://www.brint.com/papers/change/

Stoneburner, Gary, Goguen, Alice, and Feringa, Alexis. Risk Management Guide for Information Technology Systems. 2002. National Institute of Standards and Technology. 21 July 2004.


Cite this Document:

"Information Technology IT Management" (2004, July 21) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/information-technology-it-management-173305

"Information Technology IT Management" 21 July 2004. Web.19 April. 2024. <
https://www.paperdue.com/essay/information-technology-it-management-173305>

"Information Technology IT Management", 21 July 2004, Accessed.19 April. 2024,
https://www.paperdue.com/essay/information-technology-it-management-173305

Related Documents

Vandalism Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended

Information Technology Management Case Study Why is it important to have several status review and decision points throughout the project's life cycle? It is important to have several review and decision points throughout the project's life cycle because that is the only effective way of identifying potential delays and other obstacles at the earliest possible point. That enables the team to mitigate the potential damage or delay to the project as much

Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources

Project Management Like things information technology management, business intelligence typically implemented form a "project" --, a special kind organizational arrangement set specific things a specific period time, opposed a regular ongoing part organizational structure. Project management: My experience "To be successful in the field of BI, a project team needs members with an understanding of and appreciation for the information needs of the user community as well as the technologies" (Wu 2005: 1).

). Such security should also preplan strategic responses to attacks associated with the network (Dawkins et al.). A book entitled "Surviving Security: How to Integrate People, Process, and Technology" explains that the rapid expansion networking and networking technologies necessitates greater security needs. The author asserts that parts of the network such as routers, switches and even network printers are vulnerable (Andress). The article further explains that the router or switch contained

Technology Management and Improving Department Performance As the manager of a team of 25 customer service representatives our company, I've noticed the significant investments made in key technology, systems and processes are losing their effectiveness. Over the last year for example, the large investments in Customer Relationship Management (CRM) systems and training have only led to greater confusion on the part of customer service reps regarding escalation paths. The investments in