Preview

InformationTechnology TERMPAPER Question

Satisfactory Essays
Open Document
Open Document
428 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
InformationTechnology TERMPAPER Question
Information Technology
TERM PAPER
Part 1. The role of the IT manager in organizations
IT management arose in the 1990s when it became clear that that software developers and hardware engineers had neither the insights nor interest in guiding organizations on the effective use of information technology to help them improve their business operations. Both software developers and hardware engineers focus on the technical aspects of computers and do not spend much time reflecting on the management implications of technology. The IT manager, in contrast, is primarily concerned with how information technology should be integrated into business operations.
Assume you have taken over responsibility to play the lead IT management role in
Magnum Enterprises. Your boss, is Magnum’s CIO. The IT management group is comprised of six people who you will be supervising.
CIO is an enlightened manager, and she believes that if you are to carry out your responsibilities effectively, you need to work with her in defining your IT management role. As a first step, she invites you to write a short statement where you describe what you see to be your role as head of the IT management effort at Magnum.
In writing your statement, describe how you see your role in integrating software, hardware, and business management capabilities. What challenges do you anticipate encountering as head of the IT management effort at Magnum? By serving as the centerpiece of software, hardware, and management capabilities, how the efforts of you and your team make Magnum a better organization?
Part 2. Handling the e‐business challenge at Magnum Enterprises
Six months after you take over the lead IT management role at Magnum, the CIO is pleased with your work. She has just attended a meeting of Magnum’s

executive committee (the committee comprised of the most senior managers of
Magnum), where the CEO and Vice President of marketing have indicated that
Magnum’s mediocre e‐business

You May Also Find These Documents Helpful

  • Good Essays

    Dawn Riley Case Report

    • 951 Words
    • 4 Pages

    She needs to be more assertive in her role as CEO and not take the passive, participant role as a key leader of the team.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mullinex, L. S. (2012, January). Confusion over the Telephone Consumer Protection Act. Social science research network, 34(20), 9.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In an insightful article in MIS Asia, Chris Potts says, “In less than five years’ time, the CIO role, according to CIOs themselves, is destined to become either an executive leader of business change or absorbed into another role,” and walks you through the reasoning and the changes that need to happen.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Glaser, J. P., & Williams, R. B. (2010). The Definitive Evolution of the Role of the CIO. Journal of Healthcare Information management, 21(1), 9-11. Retrieved from http://www.himss.org/files/HIMSSorg/content/files/03_column_Leadership.pdf…

    • 438 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often when governments pass laws and acts, it is to serve better the people within their country or jurisdiction at that moment as well as the foreseeable future. However with the quickly changing technology of today it is not always possible to pass laws that last very long when it aimed at controlling or monitoring certain technology. In the last few decades the United States Government passed two laws aimed at telemarketers. The first Act was passed in 1991 and is called the Telephone Consumer Protection Act (TCPA) and the second is the Do Not Call Implementation Act of 2003.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This work contains INF 220 Week 5 Assignment Final Paper Information Systems as a Whole…

    • 496 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Business processes and information systems are pieces of the same puzzle in my work experience. One needs have both pieces to reach the business goal or end state successfully. To understand the relationship and make it successful, one needs to understand what business processes are and how information systems can be used to support or manage them. In this paper, I will address these topics as they pertain to my own work environment.…

    • 978 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 4224 Words
    • 17 Pages

    6. If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?…

    • 4224 Words
    • 17 Pages
    Good Essays
  • Better Essays

    Disaster Recovery

    • 1942 Words
    • 8 Pages

    The chief information officer is the executive who manages the IT department and leads the organization in their efforts to develop and advance IT strategies. The role of the CIO in health care organizations is to: set visions and strategies, integrate information technology for business success, and make changes when necessary, build technological confidence, partner with customers, ensure information technology talent, and build networks and community. They should also establish and maintain good working relationships with the members of the organization’s leadership team and communicate IT performance. It is the CIO’s job to manage and led the IT department to achieve organizational excellence and success (Wager, Lee, & Glaser, 2009).…

    • 1942 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The original Children’s Internet Protection Act became effective on October 21, 1998 and was modified April 21, 2000 (Information Shield, 2004-2011). The law was aimed at operators of commercial websites, and online services directed at children below the age of 13. The law also targeted operators directed at the public with the knowledge of children 13 and below visiting there sites. With the increased use of computers, information technologies like electronic mail, chat room websites, and social websites creating direct contacts with children. These young children needed to be protected from information that the children were too young for, as well as organizations that illegally could use information that these children may provide them (Federal Communications Commission, 2013). The Children’s Internet Protection Act requires institutions to make parents aware of their communications with their children. The institutions have to get the parent’s consent; the parent can review what the child has been doing on the site, and to restrict further activity. The institution must limit the information it receives from a child and have a system in place to protect the information it does collect (Information Shield, 2004-2011). The rule was put into place because of ease that children had gaining access to inappropriate material.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Ajax Development technique for creating interactive Web applications capable of updating the user interface without reloading the entire browser page.…

    • 1010 Words
    • 5 Pages
    Better Essays