Você está na página 1de 4

Information technology management

IT management is the discipline whereby all of the


information technology resources of a rm are managed
in accordance with its needs and priorities. These resources may include tangible investments like computer
hardware, software, data, networks and data centre facilities, as well as the sta who are hired to maintain them.

lows enterprises to get their applications up and running


faster, with simpler manageability and maintenance, and
enables IT to adjust IT resources (such as servers, storage
and networking) quicker to meet unpredictable business
demand.[8][9]

Managing this responsibility within a company entails


many of the basic management functions, like budgeting, 2 IT infrastructure
stang, change management, and organizing and controlling, along with other aspects that are unique to technol- The term IT infrastructure is shown in a standard called
ogy, like software design, network planning, tech support Information Technology Infrastructure Library (ITIL) v3
etc.[1]
as a combined set of hardware, software, networks, facilities, etc. (including all of the information technology), in
order to develop, test, deliver, monitor, control or support
IT services.[10]
1 Overview
The central aim of IT management is to generate value
through the use of technology. To achieve this, business
strategies and technology must be aligned.

3 IT management disciplines

IT Management is dierent from management informa- The below concepts are commonly listed or investigated
[11] [12] [13] [14]
tion systems. The latter refers to management meth- under the broad term IT Management:
ods tied to the automation or support of human decision
making.[2] IT Management refers to IT related manage Business/IT alignment
ment activities in organizations. MIS is focused mainly
on the business aspect, with strong input into the technol IT governance
ogy phase of the business/organization.
IT nancial management
A primary focus of IT management is the value creation
made possible by technology. This requires the alignment
of technology and business strategies. While the value
creation for an organization involves a network of relationships between internal and external environments,
technology plays an important role in improving the overall value chain of an organization. However, this increase
requires business and technology management to work as
a creative, synergistic, and collaborative team instead of
a purely mechanistic span of control.[3]

IT service management
Sourcing
IT conguration management

4 IT managers

Historically, one set of resources was dedicated to one


particular computing technology, business application or
line of business, and managed in a silo-like fashion.[4]
These resources supported a single set of requirements
and processes, and couldnt easily be optimized or recongured to support actual demand.[5] This led technology providers to build out and complement their
product-centric infrastructure and management oerings
with Converged Infrastructure environments that converge servers, storage, networking, security, management
and facilities.[6][7] The eciencies of having this type of
integrated and automated management environment al-

IT managers have a lot in common with project managers


but their main dierence is one of focus: an IT manager
is responsible and accountable for an ongoing program of
IT services while the project managers responsibility and
accountability are both limited to a project with a clear
start and end date.[15]
Most IT management programs are designed to educate
and develop managers who can eectively manage the
planning, design, selection, implementation, use, and administration of emerging and converging information and
communications technologies. The program curriculum
1

provides students with the technical knowledge and management knowledge and skills needed to eectively integrate people, information and communication technologies, and business processes in support of organizational
strategic goals.[16]
Graduates should be able
1. to explain the important terminology, facts, concepts, principles, analytic techniques, and theories
used in IT management.
2. to apply important terminology, facts, concepts,
principles, analytic techniques, and theories in IT
management when analyzing complex factual situations.
3. to integrate (or synthesize) important facts, concepts, principles, and theories in IT management
when developing solutions to IT management multifaceted problems in complex situations.[17]
The importance of IT management is to understand the
managing data. There are also diculties IT managers
overcome. The amount of data is increasing, most of the
data in is separated between the organizations and collected by dierent departments. They may not be using
the same method or procedure. Data security, quality and
integrity is most informant in receiving information. The
sources have an impact also on the sources obtained; they
may be internal or external. When the information structures do not transfer properly with each other, that can result in unreliable data. An important part to understand
in an IT management is Data Governance. It is an approach to managing information across the entire organization or company. Many will also need to know master
data management, which is a process that spans all of the
companies processes and business. Without a structure
your company will not be able to function properly. Applying these processes in Data bases, it is your job to be
able to communicate with other departments systems and
develop precise communication and holding your organization accountable of certain data issues. Your design and
programs helps increase design and technical knowledge
throughout the business.

Disadvantages of IT management

The more technology improves, everyday tasks that used


to be performed by human employees can now be carried
out by computer systems. Telephone answering systems
replacing live receptionists is one example of such substitution. It is, however, important to understand that often
these changes can lead to issues as well as benets. Losing personal communication with clients, security issues,
etc. may have a heavy impact in company value. Such

REFERENCES

aspects must be considered before, during and after all


decisions and implementations for IT management to be
successful.
Even though information technology systems allow businesses to be conducted at a faster pace, that quicker pace
is not without its aws. Information technology systems
are extremely vulnerable to security breaches. For the
most part information technology systems are most vulnerable when they can be accessed through the Internet.
If certain measures are not in place to prevent security
breaches, unauthorized individuals could gain access to
access condential data. Information can be altered, permanently destroyed or used for unsavory purposes. Additionally, sensitive information being leaked can cause a
business to lose money and can permanently damage its
reputation in the eyes of potential customers.

6 Cases of IT management deciency


1. Target Corporation, 2013. Targets security and payments system was broken into by hackers, who installed
malware with the intent of stealing Targets customers information. The malware targeted 40 million credit card
numbersand 70 million addresses, phone numbers, and
other pieces of personal information. About six months
before this happened, Target invested 1.6 million dollars
to install the malware detection tool made by FireEye,
whose security product is also used by CIA. It is reasonably reliable software and it spotted the malware, but it
was not stopped at any level in Targets security department. The malware successfully came away with all the
information it wanted. Targets unresponsiveness to the
alerts resulted the exposure of the condential information of one in three U.S. consumers.[18]

7 References
[1] McNurlin, Barbara; et al. (2009). Information Systems
Management in Practice (8th ed.)". Prentice Hall.
[2] OBrien, J (1999). Management Information Systems
Managing Information Technology in the Internetworked
Enterprise. Boston: Irwin McGraw-Hill. ISBN 0-07112373-3.
[3] Bird, M. (2010). Modern Management Guide to Information Technology. Create Space.
[4] Talbot, Chris, HP Adds to Converged Infrastructure
Lineup, ChannelInsider, June 7, 2011.
[5] Gardner, Dana, Converged Infrastructure Approach
Paves Way for Improved Data Center Productivity, Private Clouds, February 9, 2010, IT Business Edge
[6] Hu, Lisa, The Battle for the Converged Data Center
Network, Data Center Knowledge, August 18, 2011.

[7] Harris, Derrick, Can Open Converged Infrastructure


Compete?" GigaOM, October 10, 2010.
[8] Oestreich, Ken, Converged Infrastructure, CTO Forum,
November 15, 2010.
[9] Golden, Bernard, Cloud Computing: Two Kinds of
Agility, CIO, July 16, 2010.
[10] Veen, Annelies van der; Jan van Bon (2007). Foundations
of ITIL V3. Van Haren Publishing. ISBN 978-90-8753057-0.
[11] 28 Nov.
2008 http://www.gartner.com/it/products/
research/topics/topics.jsp
[12] 28 Nov.
2008 http://www.gartner.com/it/products/
research/research_services.jsp
[13] McKeen, James D., and Smith, Heather A., Making IT
Happen: Critical Issues in IT Management, Wiley Series
in Information Systems, 2003
[14] CIO Wisdom: Best Practise from Silicon Valleys Leading
IT Experts, Lane, D. (ed), Prentice Hall 2004
[15] Thomas, Rhan (June 15, 2009). IT Managers and
Project Management. PM Hut. Retrieved December 13,
2009.
[16] Master of Management (Information Technology)".
Charles Sturt University. Retrieved 2014-09-03.
[17] Journal - Knowledge of Management, Economics and Information Technology (PDF). scienticpapers.org. Retrieved 2014-09-03.
[18] Riley, M., Elgin, B., Lawrence, D., & Matlack, C.
(2014, March 13).
Missed Alarms and 40 Million Stolen Credit Card Numbers:
How Target
Blew It. Bloomberg Businessweek. Retrieved from
http://www.businessweek.com/articles/2014-03-13/
target-missed-alarms-in-epic-hack-of-credit-card-data

8 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

Text and image sources, contributors, and licenses

8.1

Text

Information technology management Source: https://en.wikipedia.org/wiki/Information_technology_management?oldid=720658786


Contributors: Edward, Kku, IMSoP, Fredrik, Bkonrad, BigBen212, Edcolins, Notinasnaid, S.K., Shanes, Mdd, Gary, PaulHanson,
LFaraone, Rjwilmsi, FayssalF, Gurch, Bgwhite, DanMS, Jianhhuang, Tony1, Berolina~enwiki, NeilN, Rwwww, SmackBot, Reedy, Elronxenu, Gilliam, Victor Lopes, Kuru, Lady space, Hu12, Iridescent, CmdrObot, Raysonho, Mstandart, AntiVandalBot, Wolf grey,
KagamiNoMiko, Nickmalik, Gerry.avilez~enwiki, Rponamgi, SueHay, Wstankich, SieBot, Iain99, Carolynh 98, ClueBot, SchreiberBike,
Prokopenya Viktor, Thingg, DumZiBoT, Jovianeye, Addbot, Stwalkersock, MrOllie, Charansagar, Yobot, CaliMan88, Evans1982, AmeliorationBot, Momoricks, Erich2007, Eskandarany, Xqbot, Emrekenci, RichardRannard, W Nowicki, BenzolBot, Orgio89, Greenboite,
DivineAlpha, Utrechtse, Gtchild, Quality advisor, Racerx11, Primefac, Tommy2010, Manasprakash79, Donner60, Petrb, Shorbagy10,
ClueBot NG, Howsund, Widr, Brandon.degraaf, Danim, Helpful Pixie Bot, RLFX, JMJeditor, Phamnhatkhanh, RM.shirazi, Fakhteh.M,
Monkbot, Cathy1994515, ContentKing01, Bri.lank, JeremiahY and Anonymous: 79

8.2

Images

File:Portal-puzzle.svg Source: https://upload.wikimedia.org/wikipedia/en/f/fd/Portal-puzzle.svg License: Public domain Contributors: ?


Original artist: ?

8.3

Content license

Creative Commons Attribution-Share Alike 3.0

Você também pode gostar