Skip to main content

The Changing Role of Information Technology Management in the Era of Artificial Intelligence

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1348))

  • 340 Accesses

Abstract

Artificial intelligence (AI) has proven its popularity in the age of Industry 4.0 through reforming the area of information technology (IT). It intends to transform information technology infrastructure into intelligent systems, restoring AI importance in the IT industry. AI may play a critical role in information technology because it is primarily about virtual machines, applications, and data communication protocols. Presently, AI has established itself as a brand that identifies innovative techniques and its implications in a variety of disciplines. IT is changing at a rapid rate. This rapid change has become a continuous strength, but change has always been extremely problematic. It requires rapid change in information technology management. Change is not easy to adopt as we strongly fights with any change and the similar case also correct for business organizations. For business organizations, new change can associate to more dangers and more probable for business interruptions if it is not managed efficiently with a pre-defined information technology management policy and procedures. In business organization, information technology management requires proper training, procrastination, internal support, vendor support, new measures, and inducement. This paper provides an overview of the changing role of information technology management in in the era of artificial intelligence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B.H. Boar, Logic and information technology strategy: separating good sense from nonsense. J. Syst. Manag. 45(5), 16 (1994)

    Google Scholar 

  2. S. Paul, European IS managers get down to business. Datamation 40(5), 78 (1994)

    Google Scholar 

  3. M.T.J. Ansari, D. Pandey, M. Alenezi, STORE: security threat oriented requirements engineering methodology. J. King Saud Univ. Comp. Inf. Sci. (2018)

    Google Scholar 

  4. D. Carey, Rating the top MIS issues in Canada. Can. Data Syst. 24(6), 23–25 (1992)

    Google Scholar 

  5. Information Technology Service Management Market | 2021–26 | Industry Share, Size, Growth—Mordor Intelligence. (n.d.). Retrieved November 24, 2021, from https://www.mordorintelligence.com/industry-reports/information-technology-service-management-market

  6. A.M. Langer, in Analysis and Design of Information Systems (Springer Science & Business Media, 2007)

    Google Scholar 

  7. A.M. Langer, in Information Technology and Organizational Learning: Managing Behavioral Change in the Digital Age (CRC Press, 2017)

    Google Scholar 

  8. J. Lipman-Blumen, in The Connective Edge: Leading in an Interdependent World (Jossey-Bass, 1996)

    Google Scholar 

  9. E. Geisler, Managing information technologies in small business: some practical lessons and guidelines. J. Gen. Manag. 18(1), 74–81 (1992)

    Google Scholar 

  10. R.I. Benjamin, J. Blunt, Critical IT issues: the next ten years. MIT Sloan Manag. Rev. 33(4), 7 (1992)

    Google Scholar 

  11. R.I. Benjamin, E. Levinson, A framework for managing IT-enabled change. Sloan Manage. Rev. 34(4), 23–33 (1993)

    Google Scholar 

  12. S.L. Caudle, W.L. Gorr, K.E. Newcomer, Key information systems management issues for the public sector. MIS Quar., 171–188 (1991)

    Google Scholar 

  13. R. Kumar, M. Alenezi, M.T.J. Ansari, B.K. Gupta, A. Agrawal, R.A. Khan, Evaluating the impact of malware analysis techniques for securing Web applications through a decision-making framework under fuzzy environment. Int. J. Intell. Eng. Syst. 13(6), 94–109 (2020)

    Google Scholar 

  14. R. Kumar, M.T.J. Ansari, A. Baz, H. Alhakami, A. Agrawal, R.A. Khan, A multi-perspective benchmarking framework for estimating usable-security of hospital management system software based on fuzzy logic, ANP and TOPSIS methods. KSII Trans. Internet Inf. Syst. (TIIS) 15(1), 240–263 (2021)

    Google Scholar 

  15. M.T.J. Ansari, A. Baz, H. Alhakami, W. Alhakami, R. Kumar, R.A. Khan, P-STORE: extension of STORE methodology to elicit privacy requirements. Arab. J. Sci. Eng., 1–24 (2021)

    Google Scholar 

  16. A. Attaallah, M. Ahmad, M.T.J. Ansari, A.K. Pandey, R. Kumar, R.A. Khan, Device security assessment of Internet of healthcare things. Intell. Autom. Soft Comp. 27(2), 593–603 (2020)

    Article  Google Scholar 

  17. T.J. Ansari, D. Pandey, An integration of threat modeling with attack pattern and misuse case for effective security requirement elicitation. Int. J. Adv. Res. Comp. Sci. 8(3) (2017)

    Google Scholar 

  18. W. Alosaimi, M.T.J. Ansari, A. Alharbi, H. Alyami, A.H. Seh, A.K. Pandey, …, R.A. Khan, Evaluating the impact of different symmetrical models of ambient assisted living systems. Symmetry 13(3), 450 (2021)

    Google Scholar 

  19. M. Zarour, M. Alenezi, M.T.J. Ansari, A.K. Pandey, M. Ahmad, A. Agrawal, … R.A. Khan, Ensuring data integrity of healthcare information in the era of digital health. Healthcare Technol. Lett. 8(3), 66 (2021)

    Google Scholar 

  20. W. Alhakami, A. Binmahfoudh, A. Baz, H. Alhakami, M.T.J. Ansari, R.A. Khan, Atrocious impinging of COVID-19 pandemic on software development industries. Comp. Syst. Sci. Eng., 323–338 (2021)

    Google Scholar 

  21. M.T.J. Ansari, N.A. Khan, Worldwide COVID-19 vaccines sentiment analysis through Twitter content. Electron. J. Gen. Med. 18(6), em329 (2021)

    Google Scholar 

  22. W.C. Ho, Use of information technology and music learning in the search for quality education. Br. J. Edu. Technol. 35(1), 57–67 (2004)

    Article  Google Scholar 

  23. M.T.J. Ansari, D. Pandey, Risks, security, and privacy for HIV/AIDS data: big data perspective, in Big Data Analytics in HIV/AIDS Research (IGI Global, 2018) pp. 117–139

    Google Scholar 

  24. N. Smeda, E. Dakich, N. Sharda, The effectiveness of digital storytelling in the classrooms: a comprehensive study. Smart Learn. Environ. 1(1), 1–21 (2014)

    Article  Google Scholar 

  25. F.W. Amenyedzi, M.N. Lartey, B.M. Dzomeku, The use of computers and internet as supplementary source of educational material (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abeer A. Aljohani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Aljohani, A.A. (2023). The Changing Role of Information Technology Management in the Era of Artificial Intelligence. In: Dutta, P., Bhattacharya, A., Dutta, S., Lai, WC. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 1348. Springer, Singapore. https://doi.org/10.1007/978-981-19-4676-9_26

Download citation

Publish with us

Policies and ethics