Managing The Hidden Costs Of Information Technology Term Paper

¶ … Managing the Hidden Costs of Information Technology Information technology is an increasingly critical aspect of organizational functioning, thus most organizations can not afford to operate without it. There are many costs, direct and hidden however that result from information technology. It is critical to understand and learn how to manage those costs for organizations to succeed. Most of the direct costs associated with information technology include the obvious: acquisition of software and hardware, installation, daily operations and maintenance as well as purchase of equipment necessary for end users. There are several hidden costs however that often drive overhead expenses to the extreme. These are discussed below.

Among the hidden costs of information technology include training for IT specialists, an ongoing need facilitated by rapidly changing technology. Training itself not only costs an organization, but lost productivity time per IT worker is also very expensive...

...

Among the training costs incurred include project management, administrative costs and time spent signing people up for classes (Dash, 2002). Most training courses generally require anywhere from five to 40 hours of management time (Dash, 2002). Training is an ongoing need in organizations utilizing information technology, and often becomes one of the biggest hidden expenditures not accounted for by management teams.
The best way to manage this type of cost is to budget for it and prepare for it according to the director of operations for the technology learning group at IT Association (Dash, 2002).

Hidden costs are also associated with a client/server arrangement including system management, overcoming LAN limitations and internetworking.

Whereas direct costs include installation and purchase of IT assets and computers as well as daily operation, other hidden costs may include: routine preventive maintenance, lost productivity and loss of "corporate…

Sources Used in Documents:

References:

Atre, Shaku. "The hidden costs of client/server." January 25, 1997. DBMS, 17, November

2004 from: http://www.dbmsmag.com/9506d15.html

Dash, Julekha. "Uncovering the Hidden Costs." March 18, 2002. Computerworld, 17,

November, 2004: http://www.computerworld.com/managementtopics/management/story/0,10801,69111,00.html
Paper. 17, November 2004, from: http://www.microdata.com/group/White%20Papers/The%20Hidden%20Costs%20of%20Your%20Network.pdf


Cite this Document:

"Managing The Hidden Costs Of Information Technology" (2004, November 17) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/managing-the-hidden-costs-of-information-59992

"Managing The Hidden Costs Of Information Technology" 17 November 2004. Web.20 April. 2024. <
https://www.paperdue.com/essay/managing-the-hidden-costs-of-information-59992>

"Managing The Hidden Costs Of Information Technology", 17 November 2004, Accessed.20 April. 2024,
https://www.paperdue.com/essay/managing-the-hidden-costs-of-information-59992

Related Documents

Technology & Logistics The author of this report has been asked to answer a fairly general but intriguing question. That question asks the author of this report to define how technology can improve the management of global logistics. Of course, technology can be used to improve logistics in any number of ways. However, the author of this report will center on a few in particular. Indeed, the use of barcodes, networking

Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end

Given the virtual ubiquity of information technology (IT) today, it is not surprising that while collar crime using these resources has assumed new importance and relevance (Dervan, 2014). As discussed further below, white collar crimes are by definition nonviolent in nature but the enormous amount of funds that are derived from such unlawful activities are increasingly being diverted to fund violent terrorist organizations that target the interests of the United

As costs continued to escalate and IT was not creating any significant cost reductions through efficiencies, the focus shifted to outsourcing non-critical functions that were routine in nature and could be therefore replicated easily. In 1991, BP senior executives chose to begin outsourcing operations, telecommunications, systems development and IT maintenance. This strategy, along with the recentralization of IT led to the company eventually cutting their IT budget in half from

The scanner's ability to translate typewriter characters into bit-mapped image into ASCII text depends on a number of factors, including the sensitivity of the device itself and the legibility and method of preparation of the original document; however, improvements are being made all of the time and even formerly graphic-based scanning systems such as Adobe's notoriously slow PDF applications have incorporated character recognition systems that allow for textual scanning.

Arby Fields: Computing, Networking, And Information Technology Hardware and Software Recommendations Fields Comprehensive Youth Services Inc. (FCYS) is a small nonprofit company based in southern California that serves adolescent male who are dependent and delinquent minors. FCYS has thirty employees. This study addresses the computing needs of the organization including hardware and software requirements as well as requirements for information technology security in the organization. The purpose of this study is to