Public Service Information Technology
eBook - ePub

Public Service Information Technology

The Definitive Manager's Guide to Harnessing Technology for Cost-Effective Operations and Services

Edward Uechi

  1. 244 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

Public Service Information Technology

The Definitive Manager's Guide to Harnessing Technology for Cost-Effective Operations and Services

Edward Uechi

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

Public Service Information Technology explains how all areas of IT management work together. Building a computer-based information system is like constructing a house; different disciplines are employed and need to be coordinated. In addition to the technical aspects like computer networking and systems administration, the functional, business, management, and strategic aspects all are equally important. IT is not as simple as expecting to use a software program in three months. Information Technology is a complex field that has multiple working parts that require proper management. This book demystifies how IT operates in an organization, giving the public manager the necessary details to manage Information Technology and to use all of its resources for proper effect.

This book is for technical IT managers and non-technical (non-IT) managers and senior executive leaders. Not only will the Chief Information Officer, the IT Director, and the IT Manager find this book invaluable to running an effective IT unit, the Chief Financial Officer, the HR Director, and functional managers will understand their roles in conjunction with the technical team. Every manager at all levels of the organization has a small yet consequential role to play in developing and managing an IT system. With practical guidelines and worksheets provided in the book, both the functional team and the technical team will be able to engage collaboratively to produce a high-quality computer-based information system that everyone involved can be proud to use for many years and that can deliver an effective and timely public program to citizens.

This book includes:



  • Multiple layers of security controls your organization can develop and maintain, providing greater protection against cyber threats.


  • Job-related worksheets you can use to strengthen your skills and achieve desired program results.


  • Practices you can apply to maximize the value of your contracts and your relationships with for-profit companies and other contractors.


  • New method for deciding when contracting or outsourcing is appropriate when internal resources are not available.


  • Improved method for estimating intangible benefits (non-financial gains) attributable to a proposed project.


  • An approach to deciding what parts of a business process should or should not be automated, paying critical attention to decision points and document reviews.

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Public Service Information Technology un PDF/ePUB en línea?
Sí, puedes acceder a Public Service Information Technology de Edward Uechi en formato PDF o ePUB, así como a otros libros populares de Business y Information Management. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Año
2019
ISBN
9780429602030
Edición
1
Categoría
Business

Chapter 1

The IT Ecosystem:
Elements Described

CMS. CRM. SaaS. PaaS. IaaS. Cloud. These simplified terms have served well to market the latest computer technologies to a wide audience. Sales and marketing teams use these words among others to make Information Technology (IT) easier to understand – or maybe not. Behind these terms are elements that make IT work.

Chapter Summary

The computer has evolved from a single large mainframe that takes up the space of a room to a small mobile device that can be used in the palm of a hand. Changes in the components operating within have led to making the computer more powerful, faster, and smaller. Changes in the components that make an organization function have also had an influence in advancing computer technologies. All of the technological and non-technological components are the elements in the field of IT. The IT ecosystem thrives with all of the elements, changing over time like species in the natural world, in operation to work with each other.
The IT ecosystem is not a fixed system where its elements do not change. An element can be modified by a new technique, a new method, a new rule, or some other approach that improves upon the element. The IT ecosystem can be different for one organization in comparison to another organization. Various elements can be selected to create an IT ecosystem that meets the organization’s needs. Public managers can pick and choose those elements.
This chapter enables the public manager to break the latest innovation down to its elements. In doing so, the manager will be able to understand how the product has changed and how it is different from competing brands. In cooperation with the technical team, the functional team can construct a comparable product.
Subsequent chapters will refer to this chapter for descriptions of all elements. Once the elements have been explained, the public manager can then use the elements properly to develop a broad IT program or a specific IT system. The bulk of this book helps the manager to organize, budget, select, manage, and secure all the selected elements in their IT ecosystem.

The End User

Arguably, the most important element is the person or groups of persons who use an IT system. This is the end user, a user who uses a computer product. An end user can be an internal employee who retrieves classified data in a private IT system that operates completely in one building. Another end user can be a civil servant who processes forms. Still another end user can be a citizen who submits personal information to access a government program. End users can be different types of people who work inside a government agency and who benefit from a public program. End users, moreover, can have various roles that allow them to see and do certain things.
The end user can also be a computer machine that performs a task similar to what a person would do. Such a machine user would execute a transaction with another machine user without involvement of a human. A machine user could be programmed to check another machine user and access a specific data record numerous times on a regularly set schedule. This robot or “bot” as an automated end user can free up a civil servant’s time. While the robot user carries out routine tasks or tasks requiring intensive computing power, a civil servant can focus on other tasks that require human judgment.
Whether a machine user or a human user, the circumstances surrounding a particular end user can change. The business rule or the time period can change the automated procedure in which the machine user depends on execution. The interests and motivations can change the behavior of a person. A sample of human users can suggest a new way of accomplishing a mundane task. The needs and requirements can change the direction of an organization. The collective group of public managers can decide to move their government agency on a different course.
Since the end user plays an important part in the IT ecosystem, all possible end users who would be using an IT system need to be identified and understood. How the different types of end users (human or machine) will behave have to be considered.

Information Types

The information element is the critical half in the term “Information Technology”. Computer technology does something with information. But what exactly is information?
Information can be defined into six basic types:
  1. Simple Text
  2. Still Image
  3. Document File
  4. Audio Sound
  5. Motion Pictures
  6. Multimedia Presentation
Simple text is the simplest type of information. This comes in the form of letters, numbers, and other characters defined in ASCII without any formatting applied such as a particular font size or font style. Typing characters to form a person’s name or some other word, phrase, or sentence in an input field is simple text. That submitted combination of characters without any formatting, encoding, or encryption can be transmitted through the network in plain text. The combination of characters without any formatting can be saved or stored in a text file. This basic type of information can be referred to as “raw data.”
Simple text can be easily manipulated either by the original first person or by a second or third user who has access to the information. A person can freely enter new characters, delete some characters, and continue typing characters before submitting or saving the information. Other people may be able to access the stored information, change the text, and resave the information as new. An unknown user could intercept the combination of characters in a computer network to capture and save the text in another computer at which point it could be changed or used for some other purpose that the first person never intended. Modifying simple text can be done by a basic text editor tool used in any computer.
Other tools that can be used to create simple text are a typewriter, a fax machine, and a word processor.
Still image is the next type of information. It can be in the form of a simple icon, a data graph, a line drawing, a complex illustration, and a photograph. Any instance of these forms provides a graphical representation of some concept, thing, or person at a particular moment in time. While simple text may not arouse excitement, a still image can evoke a certain type of emotion in an audience. The common saying goes, “A picture says a thousand words.” A graphic image can tell a story in a visual way that a writer can in an essay.
Unless it was created by specialized computer software, the original graphic whether it was made by pencil, pen, paint, or film camera will have to be converted into a digital format. A specialized computer hardware device can scan a drawing, a painting, and a photograph for use in a computer. A digital camera that replaces a film camera can create a photograph already in a digital format.
A digital still image can be manipulated or corrupted either accidentally or intentionally. Because it involves a particular process to create and modify, an image requires the use of the same specialized computer software such as Adobe Photoshop or Corel Draw to view and change. A different software program would not be able to open and read the image or it could damage the image if it was forced to read it. A person would need an intermediate software program to convert the image from one format created in Photoshop, for example, to another format that can be read by Corel Draw. The original software program could also resave the image into another digital format such as GIF, TIFF, JPEG, or PNG for viewing in another software program.
Be forewarned that the various image formats come with various image resolutions that can produce loss of quality in the new image. The GIF format generates a low-quality image with significantly reduced colors. It was designed to transmit and display images quickly for the Web. The JPEG format is widely used to save a photographic image with millions of colors and very high quality. The TIFF format is an older digital format that maintains very high image resolution and very high file size. A high-resolution image can be reduced down to a lower resolution format and maintain its original graphical representation as intended by the creator. On the other hand, going from a low-resolution image to a higher-resolution format can distort the graphical representation. The creator of an image has to be aware of the number of times that an image is converted across different formats because each change generates a certain loss of image quality. The manner in which an image is converted or the number of times of changing the digital format could change the image’s digital information in ways that make it corrupted.
The document file is a type of information that combines simple text and still images. It can come in a wide range of forms from a simple receipt of goods to a 500-page manuscript that explains a subject in detail. Some common forms that can be found in government are a letter, a policy memorandum, a registration form, and a survey questionnaire. Other forms can be a marketing brochure, a presentation slide, and a training manual. An advantage over simple text is that a document can have formatting with a stylized typeface, a larger font size for the heading and a smaller size for the body, and a different font style such as bold or italics to emphasize certain words. The inclusion of one or more still images can make a document more engaging to read.
Like the image type, any paper-based document has to be converted into a digital format. A specialized computer hardware device can scan a paper document and save it as a still image. If, however, a person would like to edit the text, a specialized computer software program is needed to convert the printed text into digital characters. Without specialized software, the scanned printed material becomes a still image wherein its text cannot be altered.
Numerous specialized computer software programs exist to create a wide range of document files natively in the computer. The business of desktop publishing emerged and quickly flourished in the 1990s. Microsoft, Adobe, and a few other companies produced specialized software for various industries to create letters, brochures, slide presentations, and other documents with less cost and in faster time than it was possible with traditional printing. Once a digital document was saved, a person can open it again and make a change to the text or delete an image or switch an image for a different one.
A digital document file faces a similar problem with an image file. The same software program has to be used for reading and changing the contents. A specialized software could resave a document file in another format that is compatible with a different software program. For example, a WordPerfect document can be exported into a format that is readable in Microsoft Word. Without such an export function, an intermediate software program would be needed to convert the document file.
A document file in a digital format can be changed for good or ill. A group of colleagues can share a digital document among themselves, and each one can add new information or change existing information. Some user could access a certain digital document, insert malicious computer code, save it, and then use the modified document to harm other computers. Specialized software programs can have various degrees of protection against malicious attempts to alter document files.
Audio sound is a type of information that offers a rich experience. Unlike the foregoing information types, audio can provide entertainment on top of just offering information. Forms of audio include a voice recording, a music recording, and a sound recording of natural or artificial objects. Communication from one person to another across a distance is used by a telephone device. Broadcasting audio to a mass audience was typically done (still is today) by using a radio transmitter to send live or recorded audio signals on the Amplitude Modulation (AM) or Frequency Modulation (FM) radio band to a number of radio receivers used by individuals. Other ways of broadcasting audio include transmitters and receivers operating on the Shortwave and Citizens Band (CB) radio bands. Through the use of a satellite operating in space, audio signals can be relayed to reach a larger audience than was not possible with earth-bound radio transmitters. In the past, audio was recorded on magnetic tape. Specialized computer software programs can convert analog audio signals to digital audio files and create new digital audio recordings. Digital audio becomes another type of an electronic file that can be saved in the computer. The digital audio files can then be served on the Internet in Websites and podcasts. With upgraded technology from analog to digital in radio broadcast stations, the same radio station that has been operating for decades can transmit digital audio.
Saved audio sound recordings can be changed and manipulated. With the right equipment, a person can insert a new segment, delete an existing segment, or make edits to change or move segments around. Advanced techniques to enhance or modify audio include increasing or decreasing the volume, obscuring a human voice in a way that makes it sound different, and creating special sound effects such as echo, reverberation, and fade in/out.
Audio sound can be intercepted and recorded by another user. A person could use rudimentary tools to tap into a telephone line and listen in on a phone conversation. A tiny device equipped with a microphone and a transmitter could be planted in a room and start recording any human voice, ambient noise, and other form of sound. Like with any electronic file, digital audio could be intercepted as it is transmitted across the computer network. Once sound has been intercepted in any of these instances, the captured audio could be saved.
Motion pictures is a type of information that involves a rapid succession of still images to create an illusion of people and objects moving through time and space. Typically, motion pictures is projected onto a screen at a speed of 24 frames per second. Another speed rate is 30 frames per second. Each frame presents a single still image. Audio sound is usually added to provide human voice, music, and other sounds synchronized to the movement of the images. Like th...

Índice

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. List of Figures
  7. List of Worksheets
  8. Author
  9. Introduction
  10. 1 The IT Ecosystem: Elements Described
  11. 2 IT Organization: People and Roles
  12. 3 IT Budgeting: Realization of Long-Term Benefits
  13. 4 IT System Selection: Moving Past Hype and Brand
  14. 5 IT Contracting and Outsourcing: Achieving Maximum Value from Vendors
  15. 6 IT Execution and Follow-Through: Daily Practice and Improvement
  16. 7 Information Security: Protect and Safeguard the IT System
  17. 8 IT Strategic Planning: Alignment with the Mission
  18. Conclusion
  19. Glossary of Terms
  20. Answers to Chapter Quizzes
  21. Bibliography
  22. Index
  23. Manager’s Notes
Estilos de citas para Public Service Information Technology

APA 6 Citation

Uechi, E. (2019). Public Service Information Technology (1st ed.). Taylor and Francis. Retrieved from https://www.perlego.com/book/1511224/public-service-information-technology-the-definitive-managers-guide-to-harnessing-technology-for-costeffective-operations-and-services-pdf (Original work published 2019)

Chicago Citation

Uechi, Edward. (2019) 2019. Public Service Information Technology. 1st ed. Taylor and Francis. https://www.perlego.com/book/1511224/public-service-information-technology-the-definitive-managers-guide-to-harnessing-technology-for-costeffective-operations-and-services-pdf.

Harvard Citation

Uechi, E. (2019) Public Service Information Technology. 1st edn. Taylor and Francis. Available at: https://www.perlego.com/book/1511224/public-service-information-technology-the-definitive-managers-guide-to-harnessing-technology-for-costeffective-operations-and-services-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Uechi, Edward. Public Service Information Technology. 1st ed. Taylor and Francis, 2019. Web. 14 Oct. 2022.