Information Technology Management
Information Technology Management
Information Technology
Management
Valerie Bryan
Florida Atlantic University
Practitioner Consultants
Layne Young
Business Relationship Manager
Indianapolis, IN
Donna Goldstein
GIS Coordinator
Palm Beach County School District
-
IT as a management tool;
understanding IT infrastructure; and
not part of the steamroller, youre part of the road.
What is IT?
A goal of management is to provide the right tools for
recreation organization may be comprised of many
-
Information technology is an umbrella term
that covers a vast array of computer disciplines that
permit organizations to manage their information
a fundamental force in reshaping organizations by applying
investment in computing and communications to promote
competitive advantage, customer service, and other strategic
It lets people learn things they didnt think they could
305
Exhibit 14.1
Basic Functions of Information Technology
Input
Communication
Processing
Storage
Retrieval
Output
Evolution of IT Management
-
IT today, it is necessary to look at the three previous eras
to data processing;
forms are entered and an edit report is cre-
organized into a special division called data processing,
These divisions usually serviced the entire organiza-
programmed to capture the requirements of
the business units; and
306
-
This model is a centralized method of managing
-
-
very frustrated and created a business need for smaller,
entry, directly into the mini or mainframe computer;
-
and city managers to put the responsibility of managing
-
-
-
non-event, only because companies and government
-
introduction of standards as a part of managing technol-
ogy costs, including standards for personal computers,
-
-
-
-
age the enterprise and provide and enforce standards
sorts of communication, entertainment, and informa-
been added to IT, and that is security, protecting informa-
management because not all departments have achieved
a real business need to change IT, park and recreation
Why IT?
-
ogy to make management decisions is the ultimate goal
technology management is a means to make the con-
simply looks at the screen and selects the options that
help on-screen in the computer program, instead of in
-
-
-
nization, but to be successful, it must be embraced from
-
responsibility for IT is delegated to another level in the
-
-
personnel, system redesign, upgrades, and
development of design;
create a uniform information infrastructure
databases, information policies, methods, pro-
cedures, and practices;
-
users, and as an integral player in the business
model; and
Information Resources
An organizations information resources are character-
Sources
governance
of incorporation, charter, or enabling legislation of
best
practice of management, -
resources are created as a result of the professional dis-
cipline or historical practice.
the information resources that commonly originate as
-
loads, determine personnel and other resource needs,
-
records and reports should conform to uniform and
current methods of maintaining records and reporting
-
same month during the previous year, and year-to-date,
monthly report may also permit the heads of organi-
provide comparative data and statistics and account for
Information Types
personal information, operational information, admin-
Personal Information
Personal information in IT language addresses all items
-
-
-
sonal information accumulates it becomes a resource
to strict policies regarding the creation and storage of
Operational Information
Operational information
information is used for day-to-day business manage-
increases the number of organization services
Administrative Information
Administrative information refers to applications that are
make sure the systems are correctly used and to ensure
-
Departmental Information
Departmental information
-
nization business such as marketing and assessment
-
-
-
IT as a Management Tool
Exhibit 14.2
Value of Information Factors
Correctness
Accessibility
Timeliness
Precision
Security
Response time:
Information retrieval from request to
Accuracy:
On-line:
Information can be accessed from
Up-to-date:
Bug-free:
Barrier-free:
Information in not requested
Data entry to information output is
Utility:
Equipment:
-
Reliable:
-
case, all systems should provide reliable information
-
priate information system should encompass personal
information, business information, and administrative
-
accounts;
a desktop team that installs and maintains the
computer assets;
a consulting team that provides assistance to
-
tions; and
Records Management
-
connecting users to all the databases and providing a
documentation system for risk management is essential
The Internet
-
.
of information to be routed from one host to another
as necessary, regardless of the computer creating the
browsers
-
search engines -
and Infoseek; today, users are generally more
Internet Service Providers (ISP) set up shop to
pay a modest cost to access the Internet; compa-
nies and recreation, park and leisure agencies
presence on the net
-
-
-
ence phones, more interaction is feasible for
-
access social networking
-
mation about leisure programs and services to
a global market;
video conferencing
a technology that communicates audio and
video for a live meeting so that participants can
see each other and materials being discussed; in
some cases, the conferencing is from one host
site to many sites, and in some cases from desk-
narration and multimedia content to transform
only for advertising a service or product,
but also to make reservations, or purchase a
as a professional organization contact for infor-
;
; and
as a means to train employees at their desks, for
problems of viruses, unscrupulous vendors, marketing
the use of telecommunications has become more and
for additional infor-
-
-
Exhibit 14.3
Worldwide E-commerce Growth
2000
2001
2002
2003
2004
Source:
Exhibit 14.4
Users of the Internet
technology is fundamentally the same as Internet tech-
The intranet is the method of implementing
-
ming and interfaces, an entire organization can be run
sound, intranet technology makes it easier to manage
and handle the vast amount of information necessary
-
Arizona, an intranet is used to connect the recreation
-
document management;
departmental training;
policies and procedures;
corporate directories; and
-
ings, employee handbooks, calendars of events, and
Electronic Messaging
-
-
Electronic messaging references the collective tech-
e-mail;
push technology;
list servers;
activated kiosks;
on-line chat mode;
Exhibit 14.5
Comparison of Friendly Yellow Pages and the Internet
STEP
The Internet
of the page, or the placement of the page, that the
information presented is factual and can be taken
-
order
video conferencing;
becomes more important to day-to-day operations,
-
Spamming, using electronic message systems to send
unsolicited bulk messages, and , posting delib-
erately hostile messages on the Internet or an intranet,
can become a problem
possible to misrepresent an agency by using anothers
-
voice and data functions has led to the development
This technology makes it possible for national and
international companies to provide services to users
-
-
-
have been able to communicate more reliably, in a timely
Electronic messaging is the collective technology that
telephony technol-
ogies.
-
ing component moves to conduits such as cable, the speed
of processing the ever-increasing amounts of information
-
security systems; and
Today, a telephone bill can contain numerous services
have direct and immediate access to people and ser-
complicated policies are developed to prevent abuse;
-
call center
-
-
dials one number, and the calls are logged using an
is a tool used to guarantee prompt service for callers and
Exhibit 14.6
AVR System Responses
Typical AVR System Initial Response to Customer
Thank you, for calling
Typical AVR System Information Dissemination Response
Typical AVR System Information Fax-Back Response
leave a voice mail message or be transferred to an opera-
to get to a live person is considered voice mail jail. This
Centralized faxing
regarding the successful or unsuccessful transmission of
-
-
list servers
the organization by using anothers e-mail to order
considered a public document, and under the Freedom
of Information Act, the media and others may request
-
a neighborhood;
display property values surrounding park
lands; and
calculate under-served areas;
plan public transportation routes to parks and
facilities; and
identify desirable open space for land acquisi-
tion;
create an impact scenario should services be
-
-
decision makers and service providers to see the impact
other forms of data, an integrated approach can be
on the Internet at
economic development, park services, recreation ser-
What is GIS?
-
enhance the
special layers.
parcels have a physical address; a parcel layer
is used to distinguish private from government
actually surveyed, so that the boundaries can
For practical reasons, aerial photography is done once
-
Research/query.
Inventory. A schools layer is an inventory of all
Analysis
-
a descriptive title;
a symbolized map key;
a properly cited data source;
an appropriate scale bar; and
people; and
-
is much too costly for a typical park and recreation
of a county or regional government entity that can lever-
that leisure service agencies participate as users of the
GIS as an Industry
-
in schools, colleges, and universities throughout the
-
government, military and utility companies to manage
Components of a GIS
data;
impossible; and
-
ogy that could tie the data of multi-government
Anyone can purchase devices the size of hand-held
calculators that identify hotels, restaurants, and gas
Exhibit 14.7
GIS Components
-
-
Data
-
People
-
maintain a parks layer and create maps for public presentation at board, council, and public meet-
Methods
-
-
functions; organizations should specialize in
creating layers of data and not in maintaining
Exhibit 14.8
Case Study: Fire Management Interactive Application of GIS at Point Reyes National Seashore
-
-
-
.
On these carrier frequencies are broadcast codes, much
like radio or television stations broadcast information
developed to help apply precise amounts of chemicals;
of liquid nitrogen is applied to the areas being fertil-
on the front of the sprayer that correspond to the nozzle
detect the level of nitrogen in the plants, adding nitro-
agency to encourage people to engage in safe-comput-
Data/Application Security
This pertains to the policies and procedures a depart-
-
to protect the information assets should something
user activity assists in determining the cause of such
-
Network Security
-
is to prevent an event that disables an agencys ability
-
No Recovery
have no -
mentation, no backup , and no contingency
and shipped, these organizations must be prepared
greater data currency and faster recovery than users of
data loss are still possible, but it is easier to make such
Tier 6 business continuity solutions maintain the high-
have no dependence on the applications or applications
require some form of disk mirroring
synchronous and asynchronous solutions available
from the mainframe
recovery point and recovery time-
can be computed by identifying the components needed
-
-
payload, such as a worm or Trojan horse program
disk drive;
send itself to everyone else on your e-mail list;
-
ence of infection;
get some of the best protection available from
-
properly protected are at higher risk of contracting a
you open them;
-
virus vendor; let the program help protect you
by automatically updating the virus signature
your antivirus program to check your system
-
tact your IT department if any of these occur on your
Exhibit 14.9
Virus Protection
Zone Labs
Adware programs try to intercept and redirect your
Spyware
personal information so that it can be transferred to an
is to identify your preferences so that ads for products
-
-
cookies.
Want a cookie?
-
accounts.
that you can remember, but is hard for anyone else to
als, symbols;
has at least one symbol character in the second
numbers;
does not use any part of your log-in name for
language;
does not use numbers in place of similar let-
ters;
does not reuse any portion of your old pass-
keep it to yourself;
needs a high level of protection;
months; and
if you had reason to tell someone your pass-
Restriction.
environment is to harden the server operating system
for an intruder to use a client machine to hack into your
help protect your privacy is much the same; it involves
tion as needed;
-
-
cuted and their procedures understood; and
to put in place a plan for disaster recovery for
-
ment problem that can be corrected by implementing a
Exhibit 14.10
Survey Results of Senior IT Executives
Exhibit 14.11
Article on the Need for Security
data are vulnerable to being
lost in the event of a disaster
-
and procedures affecting domestic preparedness,
response, and consequence management for terror
-
tested the capacity, adequacy, and limits of disaster policy
Source:
Disaster Recovery
Our customers tell us that their greatest challenge
isnt backing up their informationits recovering and
-
-
more aligned on disaster readiness, according to the
330
-
Understanding IT Infrastructure
-
Exhibit 14.12
Effects of 9/11 on IT Security
plans
plans each year
Workstations
Source: -
and communication services that are used to perform
infrastructure determines an organizations ability to
size machine that can provide all of the basic computer
manufacturers compete to provide the best solution for
-
for business applications are the Intel-based computers
Laptops have become a popular alternative to
Exhibit 14.13
The Components of an IT Infrastructure
Component
Description
Workstations
mobile devices
received
systems
Data Center
Mobile devices
other combination cell phone and data devices are
Ergonomics-
carpal tunnel syndrome, headaches, and back prob-
-
-
Networks
-
Fileserver
Servers
of large disk storage systems and large amounts of
important because they centralize data storage func-
application server
-
communication servers are used
Wiring (Topology)
functionality of buildings, provide enhanced resale
Gateways
A hub
A router
another, assuming they have the same standard proto-
A switch
generally a simpler and faster mechanism than a router,
-
-
-
-
-
A wide area networkWAN-
resources, it may be necessary to link the administra-
storage that are shared in common by multiple com-
-
333
Enterprise Networks
-
cols, from multiple locations around the city or across
recreation organization becomes part of the enterprise
requires that each entity on the enterprise conform to
-
for campground reservations throughout a state park
system or for a recreation event calendar for citizens,
encompassing not only the public recreation centers,
Data Centers
In large government organizations and businesses, the
It has a special environment that includes temperature
-
vices as daily backup of data, running reports, archiving
and restoring data, doing routine maintenance of sys-
-
of data center services are usually charged back to the
analyzes the call log and makes recommendations to the
-
-
ner or business partner in the process, organizations
plan, and updating, upgrading, or changing technolo-
-
-
An organization may develop an IT strategy that
desired outcome of this strategy is to make the organi-
decisions, improve their use of technology, and use
clarity and long-term direction for both management
-
Exhibit 14.14
The Steps in Developing a Technology Plan
Step 1: Determine programmatic issues and
business goals
Step 2: Develop a preliminary vision for
technology use
Step 3:
technology and available resources
Step 4:
technology
Step 5: Identify technology solutions
Step 6:
technology vision and priorities
Step 7:
Step 8: Develop a technology budget
Step 9:
Step 10: Develop a technology implementation
timeline
Step 11:
technology plan
Source:
To develop a successful IT plan, each park and
the plan;
-
Paradigm Shifts in
Information Technology
-
-
-
-
-
To overcome that obstacle, departments reorganized,
centralized versus decentralized management because
335
-
required to support the information function of the
engineered to create an information resource that is
on IT resources must move the organization closer to
departments are held accountable for informa-
training as needed;
systems are developed based on the strengths
the tasks;
systems in place;
-
-
erations; and
various services;
-
neered so that the customer receiving the ser-
Exhibit 14.15
Summary of Shift from Personal to Work-Group Computing
Organizational hierarchy
Designing technology
Tailorism
Technical users
Installing technology
336
Group performance
-
-
There are many tools, such as e-mail, teleconferencing,
Integrated Systems
other organizations or vendors, become contractors, or
continue at the same service levels, using available
-
-
personal information generated by all users is
Government entities, businesses, and universities are
organizations moving from being service producers to
-
Enterprise Computing
organizations that provide park and recreation ser-
-
to each organization to determine if it is practical and
Assessing IT Needs
-
methods and techniques to manage an agencys infor-
costs for planning, developing, implementing, and
training, and the indirect cost of change and its impact
of contractors;
organize tournaments, manage facilities, or
both;
operate as one organization or autonomous
divisions or sections;
should be moved from an information-producing to an
business need component provides guidelines as to the
information resource required for making the organiza-
commits to beginning or continuing the evolution-
ary process of integrating department information
-
lecting facility rental data and printing a schedule,
make IT part of your business
planembrace technology
information-producing to an integrated information
-
-
lar competing products or acquisition through grants,
-
purchasing process, and has a computer delivered, it
-
-
tive disposal of old and unused equipment requires
are in the
no longer can be reduced to the direct costs associated
-
must continually reevaluate their plans and reset their
-
because of the additional administrative time needed to
-
puter use by patrons, banking fees are all considerations
Once the team is assembled, specialists and techni-
-
-
-
ness and the director understands the basics of the IT
agencies, directors must learn more about IT in order
Exhibit 14.16
Members of the IT Planning Team
or
An administrative assistant
Management
of the park and recreation business and information
-
opments, customer trends, computer industry
provide special reports and respond to infor-
mation requests; and
enforce conformity or notify proper authorities
to know
-
recreation, park, and leisure organizations on the value
of information technology remains an ever-present
Exhibit 14.17
Assets: Information Appliances
Technology
Desktop computer
Digital camera
55 percent
Laptop computer
30 percent
Source:
-
-
-
Information Skills
-
ment, brokering services, pay-for-performance, cus-
-
-
tions, there is a corresponding information skill that
Exhibit 14.18
Paradigm Shift Related to Information Control
From
To
Information protecting
Information sharing
Source:
Exhibit 14.19
Training Materials Study
Traningmag.com 2003 Industry Report
-
their various multi-media components and multiple
techno-toolsas a more enticing and less stressful
basis;
-
-
Exhibit 14.20
Top Reasons Companies Are Using
Multi-media Based Training
Question to the reader: Have the reasons altered over time?
Source:
Training
the participants are less likely to zone out and more
-
groups through employment training modules designed
-
skills are less apprehensive about entering the techno-
recreation, park, and leisure service agencies in service
area positions such as landscaping, maintenance, and
-
individuals, specialized training is needed to not only
address the technology skills, but in some cases, to
Talk to your IT department.
of the technology and reduce the time for the
-
Tailor the multimedia to meet the needs of the
-
ing as possibleif material is more suited to
deliver by paper, then multimedia may not be
-
ing, interacting, and as a laboratory for discuss-
-
media have the same level of sophistication in
using technology and multimediaprovide
varying levels of interaction for the varied lev-
-
-
ences and feed the information back into the
Resources
Older Americans, broadband and the future
of the net
pdf
Quotable business: Over 2,800 funny,
irreverent, and insightful quotations about corporate
life.
public Policy, and focusing events
What the surveys tell
us about use and information technology in higher
education
School Administration: Knowledge, Constructs
and Theory.
Convene, X, 10
The internet and busi-
ness: A lawyers guide to the emerging legal issues. The
T H E Journal
Schole: A
Journal of Leisure Studies and Recreation Education,
11
Technological
Horizons in Education, 24
Homeland secu-
rity law and policy.
Beyond maps: GIS and deci-
sion making in local government.
Managers guide to purchasing an
information system.
-
ing needs in the use of distance education for
International Journal of Educational
Telecommunications, 1
-
Multimedia training: Top 10 tips for man-
agers
Facing
the unexpected: Disaster preparedness and response in
the United States
Technological Horizons
in Education, 24
-
html
What you should know
Previous Author