World Library  
Flag as Inappropriate
Email this Article

Information technology management

Article Id: WHEBN0001098368
Reproduction Date:

Title: Information technology management  
Author: World Heritage Encyclopedia
Language: English
Subject: WikiProject Spam/LinkReports/, Management, Information technology management, Design management, Outline of business management
Collection: Information Technology Management
Publisher: World Heritage Encyclopedia

Information technology management

IT management is the discipline whereby all of the information technology resources of a firm are managed in accordance with its needs and priorities. These resources may include tangible investments like computer hardware, software, data, networks and data centre facilities, as well as the staff who are hired to maintain them.

Managing this responsibility within a company entails many of the basic management functions, like software design, network planning, tech support etc.[1]


  • Overview 1
  • IT infrastructure 2
  • IT management disciplines 3
  • IT managers 4
  • Disadvantages of IT management 5
  • Cases of IT management deficiency 6
  • References 7


The central aim of IT management is to generate value through the use of technology. To achieve this, business strategies and technology must be aligned.

IT Management is different from management information systems. The latter refers to management methods tied to the automation or support of human decision making.[2] IT Management refers to IT related management activities in organizations. MIS is focused mainly on the business aspect, with strong input into the technology phase of the business/organization.

A primary focus of IT management is the value creation made possible by technology. This requires the alignment of technology and

  1. ^ McNurlin, Barbara, et al. (2009). "Information Systems Management in Practice (8th ed.)". Prentice Hall. 
  2. ^ O’Brien, J (1999). Management Information Systems – Managing Information Technology in the Internetworked Enterprise. Boston: Irwin McGraw-Hill.  
  3. ^ Bird, M. (2010). Modern Management Guide to Information Technology. Create Space.
  4. ^ Talbot, Chris, “HP Adds to Converged Infrastructure Lineup,” ChannelInsider, June 7, 2011.
  5. ^ Gardner, Dana, "Converged Infrastructure Approach Paves Way for Improved Data Center Productivity, Private Clouds,” February 9, 2010, IT Business Edge
  6. ^ Huff, Lisa, “The Battle for the Converged Data Center Network,” Data Center Knowledge, August 18, 2011.
  7. ^ Harris, Derrick, "Can Open Converged Infrastructure Compete?" GigaOM, October 10, 2010.
  8. ^ Oestreich, Ken, "Converged Infrastructure," CTO Forum, November 15, 2010.
  9. ^ Golden, Bernard, "Cloud Computing: Two Kinds of Agility," CIO, July 16, 2010.
  10. ^ Veen, Annelies van der; Jan van Bon (2007). Foundations of ITIL V3. Van Haren Publishing.  
  11. ^ 28 Nov. 2008
  12. ^ 28 Nov. 2008
  13. ^ McKeen, James D., and Smith, Heather A., Making IT Happen: Critical Issues in IT Management, Wiley Series in Information Systems, 2003
  14. ^ CIO Wisdom: Best Practise from Silicon Valley's Leading IT Experts, Lane, D. (ed), Prentice Hall 2004
  15. ^ Thomas, Rhané (June 15, 2009). "IT Managers and Project Management". PM Hut. Retrieved December 13, 2009. 
  16. ^ "Master of Management (Information Technology)". Charles Sturt University. Retrieved 2014-09-03. 
  17. ^ "Journal - Knowledge of Management, Economics and Information Technology". Retrieved 2014-09-03. 
  18. ^ Riley, M., Elgin, B., Lawrence, D., & Matlack, C. (2014, March 13). Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It. Bloomberg Businessweek. Retrieved from


1. Target Corporation, 2013. Target's security and payments system was intruded by hackers, and malware was installed, ready to steal Target’s consumers’ information. Information that the malware was aiming includes “40 million credit card numbers—and 70 million addresses, phone numbers, and other pieces of personal information”. About half a year before this happened, Target just invested 1.6 million dollars to install the malware detection tool made by FireEye, whose security product is also used by CIA. It is reasonably reliable software and it did spot the malware, but it was not stopped at any level in Target’s security department. The malware successfully came away with all the information it wanted. Target’s non-response to the alerts resulted in losing one in three of the U.S. consumers’ confidential information.[18]

Cases of IT management deficiency

Even though information technology systems allow businesses to be conducted at a faster pace, that quicker pace is not without its flaws. Information technology systems are extremely vulnerable to security breaches. For the most part information technology systems are most vulnerable when they can be accessed through the Internet. If certain measures are not in place, to ensure security breaches unauthorized individuals could be able to access confidential data. Information may be altered, permanently destroyed or used for unsavory purposes. On top of sensitive information getting out a security breach could cause a business to lose money and could permanently damage their reputation in the eyes of potential customers.

The more technology improves, everyday tasks that used to be performed by human employees are now carried out by computer systems. Telephone answering systems have replaced live receptionists in many organizations. Improved technology has led to the elimination of many manual jobs that humans used to perform such as the receptionist. Automated telephone systems have not only caused many people to lose their jobs but it has also made communicating with clients impersonal. Without talking directly to a client or better yet meeting a client face to face there is an increased chance that your message will be misunderstood. This miscommunication can cause a strained relationship with customers and could lead to them going elsewhere with their business.

Disadvantages of IT management

The importance of IT management is to understand the managing data. There are also difficulties IT managers overcome. The amount of data is increasing, most of the data in is separated between the organizations and collected by different departments. They may not be using the same method or procedure. Data security, quality and integrity is most informant in receiving information. The sources have an impact also on the sources obtained; they may be internal or external. When the information structures do not transfer properly with each other, that can result in unreliable data. An important part to understand in an IT management is Data Governance. It is an approach to managing information across the entire organization or company. Many will also need to know master data management, which is a process that spans all of the companies processes and business. Without a structure your company will not be able to function properly. Applying these processes in Data bases, it your job to be able to communicate with other departments systems and develop precise communication and holding your organization accountable of certain data issues. Your design and programs helps increase design and technical knowledge throughout the business.

  1. to explain the important terminology, facts, concepts, principles, analytic techniques, and theories used in IT management.
  2. to apply important terminology, facts, concepts, principles, analytic techniques, and theories in IT management when analyzing complex factual situations.
  3. to integrate (or synthesize) important facts, concepts, principles, and theories in IT management when developing solutions to IT management multifaceted problems in complex situations.[17]

Graduates should be able

Most IT management programs are designed to educate and develop managers who can effectively manage the planning, design, selection, implementation, use, and administration of emerging and converging information and communications technologies. The program curriculum provides students with the technical knowledge and management knowledge and skills needed to effectively integrate people, information and communication technologies, and business processes in support of organizational strategic goals.[16]

IT managers have a lot in common with project managers but their main difference is one of focus: an IT manager is responsible and accountable for an ongoing program of IT services while the project manager's responsibility and accountability are both limited to a project with a clear start and end date.[15]

IT managers

The below concepts are commonly listed or investigated under the broad term IT Management:[11] [12] [13] [14]

IT management disciplines

  1. Reduced IT costs
  2. Improved IT services through the use of proven best practice processes
  3. Improved customer satisfaction through a more professional approach to service delivery
  4. Standards and guidance
  5. Improved productivity
  6. Improved use of skills and experience
  7. Improved delivery of third-party services through the specification of ITIL or BS15000 as the standard for service delivery in services procurements.

ITIL documents define best practices and accepted techniques in the information technology community. This set of guidelines is widely used in both the public and private sector, essentially providing companies with a blueprint on how to organize and manage information technology operations at the company. The library is constantly updated to ensure accuracy and to include emerging technological advances. ITIL provides a systematic and professional approach to the management of IT service provision, and offers the following benefits:

The term IT infrastructure is defined in a standard called Information Technology Infrastructure Library (ITIL) v3 as a combined set of hardware, software, networks, facilities, etc. (including all of the information technology), in order to develop, test, deliver, monitor, control or support IT services. Associated people, processes and documentation are not part of IT Infrastructure.[10]

IT infrastructure

Historically, one set of resources was dedicated to one particular computing technology, business application or line of business, and managed in a silo-like fashion.[4] These resources supported a single set of requirements and processes, and couldn’t easily be optimized or reconfigured to support actual demand.[5] This led technology providers to build out and complement their product-centric infrastructure and management offerings with Converged Infrastructure environments that converge servers, storage, networking, security, management and facilities.[6][7] The efficiencies of having this type of integrated and automated management environment allows enterprises to get their applications up and running faster, with simpler manageability and maintenance, and enables IT to adjust IT resources (such as servers, storage and networking) quicker to meet unpredictable business demand.[8][9]


This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.