CHICAGO--(BUSINESS WIRE)--The Association of Information Technology Professionals (AITP), a worldwide society of information technology professionals, held four CIO Forums that confirmed the demand for new standards of practice for information technology professionals.

The need calls for a defined profession, career path, standards of practice, core competencies and body of knowledge that will serve as a foundation for professionals, combining information technology and business acumen.

“IT professionals have always believed we’re not just ‘IT people’, that we live and thrive within our business organizations,” said CIO Forum facilitator Barb Spurway, an AITP member and principal consultant for Protegra, a business and technology solutions firm. “The CIO Forums validated the need for professionals to become proficient in business strategy and practices to better serve our businesses. AITP is taking great strides to achieve our association’s strategic goal of developing an IT Business Practitioner Profession.”

The CIO Forums were held in April and May in Dallas, TX, Raleigh, NC, San Diego, CA, and Chicago, IL, and gathered dozens of CIOs from leading organizations around the U.S. “To augment our research, it was imperative we facilitate discussions with executive leaders from Corporate America,” said AITP President Deborah Lovell. “By combining our wealth of expertise from our professional and academia members with these executive leaders, we are able to fully define the attributes of a technology business professional and the educational path required.”

The forums are one of the initial steps in meeting AITP’s strategic direction for developing a distinct IT professionalism framework, equivalent in prestige and structure to other established professions such as law, accountancy, and medicine.

AITP next steps include activating the newly-established AITP Profession Advisory Council (APAC) – comprised of volunteers in the industry, academia, and research who will steward the development of the Professionalism Framework, set skill standards, and develop the components for the IT Business Practitioner.

“In recognition of the fact that information technology is deeply embedded into all aspects of business, AITP is responding to the future needs of its professional membership,” said Dave Kamath, CIO of IDEX Corporation. “Delivering tailored programs and services will enable IT professionals to become a more effective business leader.”

For more information about APAC, contact professionalism@aitp.org.

About AITP

Association of Information Technology Professionals (AITP) is a worldwide association dedicated to promoting and evolving the technical and business skills of the information technology professional, to fostering the profession of information technology, and providing leadership opportunities in the Information Technology community. Established in 1951, AITP today is comprised of professionals, academicians, and university students in the Information Technology industry. For more information, visit www.aitp.org.

Contacts

AITP
Eric Hawkinson
312-673-5942

Permalink: http://www.businesswire.com/news/google/20090803005156/en

Designation gives students better shot at advancement in high-stakes, high-dollar field of cyber security

While most of us give little thought to how our personal and professional data is secured or whether malicious or mischievous perpetrators are trying to get their hands on it, legions of information security professionals working behind the scenes do the worrying for us and try mightily to thwart threats.

Industry insiders emphasize that, as new technologies and violators emerge at every turn, hiring the right kind of talent is becoming much more important, which makes a recent University of Houston designation by the National Security Agency and Department of Homeland Security much more significant. At the 13th Colloquium for Information Systems Security Education in Seattle last month, the university was named a national center of academic excellence in information assurance education.

The designation means a lot to UH College of Technology instructional associate professor Edward Crowley, who headed up the rigorous application process.

"At UH, the quest for academic excellence in information security began in 2002. Since then, the curriculum has continued to evolve and improve thanks, in part, to input from the National Security Agency, as well as the FBI, Secret Service and the Houston Police Department's computer forensics group," Crowley said.

The need for these behind-the-scenes and battle-ready information security experts should not be underestimated, said Michael Gibson, who heads the information and logistics technology department. "You can do more damage with a computer than you can with bullets. Think about all of the systems that run our traffic, our power grid, our energy-distribution channels," he said.

Crowley points to recent events such as Lockheed Martin's loss of F-35 fighter project data, Virginia's loss of personal health information, cyber attacks in Estonia and Georgia as well as the growing risk of identity theft.

Last month the Partnership for Public Service, a Washington-based advocacy group focused on government service, issued a report detailing serious problems within the professional community charged with protecting the government's networks. Its authors made several recommendations to the Obama administration, emphasizing that the safety of the nation requires building "a vibrant, highly trained and dedicated federal cyber-security work force."

Anne M. Rogers, director of information safeguards for Waste Management in Houston, lauds UH's approach.

"One reason we have cyber security problems is that people have focused mainly on software features and functions without considering security. That led to a lot of buggy software – things built with inherent vulnerabilities. These systems may do wonderful things, but, if data leaks out or hackers easily get in and out of them, we lose," she said. "So, it's really important to build and assess for integrity, security and adequate control. The UH program brings this focus."

UH's technology project management information systems security graduate degree program serves both UH students and non-degree-seekers who want information-assurance training. Five to 10 students complete the program each year, and Gibson expects the designation to increase demand for the curriculum.

Many of those enrolled already are information technology professionals who aim to climb the corporate ladder or join the government work force at more advanced grades. Others, like alumnus Chad Van Zandt, move straight into the program after finishing undergraduate work.

After getting his degree in information systems in 2004, Van Zandt enrolled in the technology project management graduate program and soon after began working as an intern at Houston's Gray Hat Research Corp. Upon graduation in 2006 ­­­­­­­­­­­­­­­­­­with his information assurance certification, he was promoted to executive director of educational services and consulting for the company in California.

"This is a relevant, cutting-edge program that helps shape its graduates to become formidable figures in the security technology field," he said. "To say the valuable knowledge and experience gained from this program has played a vital role in my career development would be an understatement."

While career advancement is possible without the certification, Gibson said, those who do obtain it are more likely to enter into the work force at a higher rung and rise more quickly.

"If you look across the global regulatory world, there's less and less tolerance for inappropriate information handling," explained Rogers, whose company has hired two graduates of the UH program. "As everything goes electronic, they're hiring the best people to go to battle."

Paul Williams, chief technology officer for Gray Hat Research Corp., said he looks for "the heroes of tomorrow" when hiring for his company and its clients, because true information assurance requires getting ahead of the curve and seeing the big picture.

"What the industry is looking for is the geniuses – this middle layer where expertise is so lacking," he said. "At the high end, enterprise security really is rocket science. We have clients that have 50,000 computers in the world – in 21 time zones – and tens of thousands of employees. It's a million times harder to secure those computers than just one. They need people who will ask: 'How do we cost-effectively change the paradigm of this company so that we can do more with this money?' We're talking about using what you have today to mitigate the greatest risk."

Elizabeth Anderson-Fletcher, associate vice president for research operations, said the designation supports faculty efforts to contribute to Department of Defense and Department of Homeland Security research programs.

"Examples of potential cyber security research projects would include the research and testing of procedures in the secure use of Internet-enabled supervisory control and data acquisition, or SCADA, systems that monitor, coordinate and control critical infrastructure in the energy sector. In health care, cyber security becomes a major concern as we move to the digitization of patient medical records," she said.

The four NSA-certified courses offered at UH include Principles of Information Security, Enterprise Security: Incident Response/Corp. Forensics, Applied Cryptography and Secure Communications, and Information Security Risk Analysis and Management. The training standards embedded in the courses are a part of the Information Assurance Courseware Evaluation (IACE) Program established by the Committee on National Security Systems (CNSS).

Each institution designated as a center of excellence in information assurance education must recertify its courses and submit an application for renewal as a center of excellence every five years.

###

About the University of Houston

The University of Houston, Texas' premier metropolitan research and teaching institution, is home to more than 40 research centers and institutes and sponsors more than 300 partnerships with corporate, civic and governmental entities. UH, the most diverse research university in the country, stands at the forefront of education, research and service with more than 36,000 students.

About the College of Technology

The College of Technology educates leaders in innovation and global industry. With nearly 2,000 students, the college offers accredited undergraduate and graduate degrees in construction management technology, consumer science and merchandising, computer engineering technology, electrical power technology, logistics technology, network communications, human resources development and technology project management. It also offers specialized programs in biotechnology, surveying and mapping and digital media.

For more information about UH, visit the university's Newsroom at http://www.uh.edu/news-events/.

To receive UH science news via e-mail, visit http://www.uh.edu/news-events/mailing-lists/sciencelistserv.php.

Most health care reform proposals before Congress would expand the use of health information technology, say health care IT specialists.

Both the House and Senate are contemplating some sort of online marketplace that would allow Americans to compare and buy insurance plans. The concept is referred to interchangeably as a health insurance exchange -- not to be confused with an electronic records exchange -- or gateway. A microcosm of this model already exists in Massachusetts, where the so-called Health Connector offers brand-name and publicly subsidized health insurance options to state residents.

"The underpinning of all health care reform relies on information," said Harry Greenspun, chief medical officer and executive vice president at Perot Systems. Massachusetts hired Perot Systems in 2008 to provide technical support in building Health Connector, its statewide electronic marketplace.

Greenspun, who has developed software that measures the outcomes of cardiac surgery patients, said insurance gateways combined with data from electronic health records ultimately will allow people to compare treatments as well as prices. The stimulus package that President Obama signed provides nearly $20 billion to make e-records standard by 2014.

For "The availability of verified and accepted quality information that can be agreed upon and trusted . . . nationwide, you're probably looking at an almost decadelong process," Greenspun said. "The more data you have, the greater your ability to make better decisions."

Earlier in his career, Greenspun worked with Aneesh Chopra, the Obama administration's chief technology officer, when both were at the Advisory Board Company, a Washington-based health care consulting firm. Chopra, the first to hold the title of federal CTO, will be guiding the nation's health IT strategy.

The gateways lawmakers envision would require "pretty sophisticated systems" to calculate which plans are best-suited for each user -- and keep that information private, Greenspun said. The eventual system would have to process "very complex rules," he said, to determine where a person is eligible to shop and what the person will pay under each option.

For example, one plan might reimburse a person seeking knee surgery at 100 percent and another plan might pay nothing because it covers only alternative treatments, such as physical therapy.

The Web exchange model also is critical to expanding health care coverage, said Cindy Hielscher, a senior executive at Accenture's public service health division, which serves government customers. The technology should simplify the process of enrolling in a plan and drive down the cost of expanded coverage by streamlining administrative processes and detecting waste, fraud and abuse, she said.

"If you stopped with stimulus, you would still have some good technology in place, but health reform takes it to the next level" in providing quality, reducing cost and increasing coverage, Hielscher said.

But some privacy advocates are concerned that the government is building the technology before building in protections for personal information.

"I can tell you we desperately need the data about what works for treatments in mental health... but the problem is that they are moving ahead to make every electronic health record be wired for this research without giving Americans the chance to grant permission. It's not ethical," said Deborah C. Peel, a practicing physician and the founder of the bipartisan Patient Privacy Rights organization. The group wants the government to give people the ability to control all access to their health records.

Consumers must have confidence that their health data is adequately protected, Peel said. "People will stay away from the health system [if they believe] the system is not private."

The best method for collecting information about treatments for sensitive illnesses, such as depression, AIDS and cancer, is to collect data only with the express consent of the affected patients, she said.

"We don't want to inadvertently create a system that causes suffering or even death . . . or prevents people from using the system," Peel said.

Greensboro, NC -- Market America announced that it will hire 50 information technology employees by the end of the year.

The new jobs will bring the total number of employees at the Greensboro location to 600. Half of those employees work in I-T.

Market America is a product brokerage and internet marketing company that operates in five countries worldwide. They will hold their international convention in Greensboro starting on Wednesday.

Weaknesses in the information technology systems at the Housing and Urban Development Department threaten its ability to perform its mission, according to a new report from the Government Accountability Office.

According to the report (GAO-09-675), the department's IT systems are outdated, inefficient and expensive to maintain. In addition, ineffective management controls and inadequate technological expertise have left a departmentwide IT modernization program at risk.

"HUD's current IT environment does not effectively support its ongoing business operations," the report stated. "Its information systems are overlapping and duplicative, are not integrated, necessitate manual workloads, and employ antiquated technologies that are costly to maintain."

The department relies heavily on IT to help it process 50,000 loan requests weekly and tens of thousands of grant requests annually. Under the Recovery Act, HUD received $61 million to spend on IT, of which $1.5 million will go toward a computer system to support reporting requirements for stimulus fund recipients. The remainder will be used to maintain or enhance existing systems.

GAO found that HUD has more than 200 separate information systems, including 16 financial management systems and multiple grants management systems that are unable to share data. Yet the department still relies on a spreadsheet application to track more than $16 billion in housing grants and manages another $7 billion in grants manually using a paper-intensive process because its aging systems are unable to handle the workload.

"For example, HUD relies on several different operating systems and 35 different programming languages, each of which requires specialized skills to operate and maintain," the report stated. "In addition, a 2007 study of HUD's IT environment found that the average age of its information systems was nearly 15 years, which is more than twice that of other agencies (six years)."

Another concern GAO highlighted is the department's inability to adequately manage its IT workforce. HUD officials said a lack of resources combined with high turnover among senior leaders in the Office of the Chief Information Officer have hampered their ability to address the weakness, pointing out that the department's IT workforce has decreased by 26 percent since 2006.

The report also recommended HUD develop a plan and establish an enterprisewide program management office to monitor progress on its modernization program. The department currently is not tracking its performance on IT strategic goals, but a 2007 assessment showed it was either behind schedule or not making progress on 46 percent of the activities outlined. HUD officials said no program office has been established due to funding constraints.

By: David Sherfinski
Examiner Staff Writer
August 3, 2009

Prince William has taken a number of steps to tighten controls in its information technology department after one of the biggest embezzlement schemes in county history was revealed two months ago.

A review of the Office of Information Technology's operational and financial status is under way, and a number of internal controls have been added to the system, according to a presentation to be delivered Tuesday by Deputy County Executive Melissa Peacor.

Four individuals were indicted in June on 153 state charges, which included bid rigging, forgery and money laundering. The scheme involved about $8 million in contracts approved by the county for several companies. An investigation accuses the suspects of falsifying bids and creating shell companies to be awarded county projects.

Maneesh Gupta, former OIT systems division chief, was fired in May as the investigation began. Former county employee John Roessler, his brother Vernon Roessler, and Richard Billingsley of Springfield were indicted. Two other OIT workers have been fired for their alleged involvement in the plot.

The county is also in the process of hiring a new chief information officer, county spokeswoman Liz Bahrns said. Former OIT Director Massoud Nourbakhsh, though not charged with any crimes in the scheme, resigned in the wake of the investigation.

Before now, one person in information technology was responsible for all steps involving contract controls. Now several additional review steps have been added, including review from the project manager, management and fiscal analyst, division director, and acting chief information officer.

The county's finance director is also looking at all county contracts to check what agency controls and review processes are in place, the presentation said.

To foster increased responsibility in OIT, project managers are now also responsible for project budgets and implementation. Previously, project managers were not allowed to have budget responsibility or control in the Information Systems Division. A county training program for OIT project managers has also been added.

In addition, an Internal Control Council is being established to advise management and employees on how to reduce the risk of asset loss and ensure the reliability of financial statements. The county has contracted with consulting group RSM McGladrey to perform a review of controls and security in the IT department.

dsherfinski@washingtonexaminer.com

Monday, August 03, 2009
Peter Krouse
Plain Dealer Reporter

Tony Ma tries not to think about his fate as the federal public corruption probe unfolds.

He knows he could be in trouble, having been implicated in a bribery scheme involving Cuyahoga County officials, but he doesn't want to ponder the consequences.

So he meditates, driving out all thought and leaving his mind blank. It's an aspect of Taoism, said Ma, 74, who was born and raised in Hong Kong but has lived in Northeast Ohio for most of his life.

Advertisement

So, does it help?

"I don't know about helping," Ma said, "but I'm a lot more peaceful."

Ma still goes to work every day, hoping to rebuild his small business, Broma Information Technology, on the third floor of a red-brick building at the corner of East 34th Street and Perkins Avenue. The company collected $9 million worth of contracts from Cuyahoga County over the years.

He keeps going despite the fact that virtually all of his contracts have dried up in the wake of the federal investigation and allegations that he paid bribes to get lucrative public contracts.

His only remaining employee spent much of the past week gathering documents in response to a federal subpoena stemming from work performed on the $4.3 million computer system at the Cuyahoga County Juvenile Court

The court's administrative judge, Thomas F. O'Malley, recently declined to renew Broma's maintenance contract amid concerns.

Federal agents previously pored over Broma records they subpoenaed related to the company's dealings with the county recorder, auditor and engineer.

Monday, Aug 03, 2009

IBM today announced it has signed a five-year information technology (IT) professional services agreement with Amtrak. Through the agreement, IBM will provide IT support to Amtrak focusing on improving the quality of service to Amtrak's 19,000 employees and over 28.7 million passengers nationwide.

Amtrak awarded the contract to IBM to provide data center services including mainframe, mid-range server, security services, asset management and help desk and desktop support services for 10,000 workstations nationwide. IBM will support the infrastructure for Amtrak's reservation system as well as the corporation's entire computing infrastructure from delivery centers in the United States. The volume of tickets processed in Amtrak's reservation system via the Web, telephone, and ticket counter channels, makes it one of the largest systems of its kind in the rail industry.

"IBM's strong record of delivery excellence for Amtrak has allowed them to reduce operational costs and increase productivity while focusing on their core business and customers," said Steve Welsh, IBM Global Technology Services, vice president, Travel and Transportation Industry. IBM is pleased to continue working with Amtrak to delivery high-quality services that support its customers and employees."

The agreement was signed on June 30, 2009 and continues a long-standing relationship between IBM and Amtrak, dating back to 1994.

IBM has worked with the world's leading railroads on mission critical projects for more than 50 years. The company recently opened a new Global Rail Innovation Center that brings together the world's foremost industry leaders, researchers and universities to develop smarter rail systems around the globe.

About Amtrak

Amtrak has posted six consecutive years of growth in ridership and revenue, carrying more than 28.7 million passengers in the last fiscal year. Amtrak provides intercity passenger rail service to more than 500 destinations in 46 states on a 21,000-mile route system. For schedules, fares and information, passengers may call 800-USA-RAIL or visit Amtrak.com.

About IBM

For more information on IBM Global Technology Services, visit IBMServices. For more information on IBM's work with leading rail networks around the world, go to IBM.

Source: IBM

New report provides detailed analysis of the Information Technology market

Published on August 03, 2009

by Press Office

(Companiesandmarkets.com and OfficialWire)

LONDON, ENGLAND

Re-Tweet this article

United Arab Emirates Information Technology Report Q3 2009

UAE IT spending is projected to remain in positive growth territory, despite the current economic slowdown, reaching US$3.15bn in 2009. Government spending and investment will provide support, and there will be continued opportunities in sectors such as construction, banking and telecoms.

UAE economic growth is forecast to suffer a reverse in 2009 before picking up in 2010. There have been vendor reports of IT managers looking to cut costs, and projects being scaled back in key sectors for IT projects such as oil and gas, real estate and construction. A number of short-term factors give concern, including the impact of a falling population on consumer spending, as some expats return home.

Despite current economic uncertainty, some fundamental drivers, including local and federal government initiatives, and development of non-oil sectors such as real estate and tourism, should help to prevent market stagnation. The total size of the UAE’s IT market is expected by BMI to grow at a CAGR of 10% from around US$3.2bn in 2009 to approaching US$4.7bn in 2013.

United Arab Emirates Information Technology Report Q3 2009: http://www.companiesandmarkets.com/r.ashx?id=Y4HF47BL2154305

Contact
CompaniesandMarkets.com
Mike King
info@companiesandmarkets.com
Tel: +44 203 086 8600




Posted 8/03/2009 5:57 AM

Posted by Peter Krouse / Plain Dealer Reporter August 03, 2009 08:59AM

Anthony Ma of Broma Information Technology is trying to rebuild his business after being implicated in an investigation that accuses him of paying bribes to secure lucrative public contracts.

Corruption probe in Cuyahoga County expands to Juvenile Court contracts, businessman says

CLEVELAND -- Tony Ma tries not to think about his fate as the federal public corruption probe unfolds.

He knows he could be in trouble, having been implicated in a bribery scheme involving Cuyahoga County officials, but he doesn't want to ponder the consequences.

So he meditates, driving out all thought and leaving his mind blank. It's an aspect of Taoism, said Ma, 74, who was born and raised in Hong Kong but has lived in Northeast Ohio for most of his life.

So, does it help?

"I don't know about helping," Ma said, "but I'm a lot more peaceful."

Ma still goes to work every day, hoping to rebuild his small business, Broma Information Technology, on the third floor of a red-brick building at the corner of East 34th Street and Perkins Avenue. The company collected $9 million worth of contracts from Cuyahoga County over the years.

He keeps going despite the fact that virtually all of his contracts have dried up in the wake of the federal investigation and allegations that he paid bribes to get lucrative public contracts.

His only remaining employee spent much of the past week gathering documents in response to a federal subpoena stemming from work performed on the $4.3 million computer system at the Cuyahoga County Juvenile Court

The court's administrative judge, Thomas F. O'Malley, recently declined to renew Broma's maintenance contract amid concerns.

Federal agents previously pored over Broma records they subpoenaed related to the company's dealings with the county recorder, auditor and engineer.

In July, three former employees of the County Engineer's Office pleaded guilty to steering work on a computer mapping project to Ma's company in return for $175,000 in bribes. While Ma is not identified by name in the plea agreements, contracts and descriptions of an unnamed company official match him.

Ma, who has not been charged with a crime, said any payments he made on the mapping project were legitimate fees, not bribes.

"I don't think that I have done anything wrong," said Ma, who lived in University Heights for many years before moving to Moreland Hills about five years ago.

Neither Broma's work for the Recorder's Office nor the Prosecutor's Office has been implicated in any corruption allegations. But those contracts have ended.

Patrick O'Malley
Broma's dealings with the County Recorder's Office began in 1997 after Patrick O'Malley was named by the county Democratic Party to replace outgoing recorder Frank Russo, who became auditor.

O'Malley told The Plain Dealer in 1998 that he selected Ma as a consultant because he was the best person for the job. O'Malley acknowledged he would take some heat because Ma had been recently convicted of obstructing justice in a corruption investigation into Cleveland Municipal Clerk of Courts Benny Bonanno.

Ma ran the clerk's computer department. The charges against him stemmed from the answers he gave to a grand jury.

Before going to work there, Ma held other government jobs, including planning director for Youngstown and executive director of the Regional Income Tax Authority.

Records show Broma received more than $3.8 million in largely no-bid contracts over the past 12 years to integrate and maintain the Recorder's Office computer system. Because of Broma's early involvement, it was only practical that it be the one to maintain the system, said Jim Zak, information technology administrator for the Recorder's Office.

"To the best of my knowledge, it wouldn't have made much sense going out to bid," Zak said.

County Recorder Lillian Greene, who replaced Patrick O'Malley last year after he resigned amid charges of distributing pornography, said she has not asked for an investigation into Broma's role at the Recorder's Office.

Her chief of staff, John Kandah, said the issue is moot since the Recorder's Office switched to a different vendor this year, a decision made before it was known Broma was under investigation.

Zak said Broma did an excellent job, and about two years ago it developed a new system for the office that uses Microsoft, which meant others beside Broma could do the work.

Broma also ended its work with the Cuyahoga County Prosecutor's Office this year, wrapping up a nearly $3 million contract that it inherited from CGI-AMS Inc. More than $2.6 million of that contract went to Broma, but Ma said most of what he received was paid to a subcontractor called Point Blank.

In light of the corruption probe, County Prosecutor Bill Mason had a private attorney investigate a newly proposed contract with Point Blank to make sure everything was in order. The attorney, former federal prosecutor Richard Blake, said he found no problems.

The recommendation to use CGI-AMS, with Broma as a subcontractor, was made by the architecture and technology committee of the county's Automated Data Processing Board, which reviews and approves all technology initiatives and hardware purchases in the county, said Ryan Miday, Mason's spokesman.

CGI-AMS' selection of Broma as a subcontractor on the project was not influenced by any county officials or outside influences, said Greg Robinson, who was director of government solutions for CGI-AMS at the time.

Robinson said he recalls getting a list of certified subcontractors from the county. At least three on the list, including Broma, were invited to apply, he said, and Broma was selected. Ma made the pitch for Broma.

Ma said he knows that the investigation has ruined any hope of securing new contracts in Cuyahoga County, but he still hopes to find work with surrounding communities or with private companies.

Throughout his career, Ma said he ran a loose organization, believing it was best to give people plenty of freedom. He also enjoys seeing others do well. One of his goals, he said, is to help others so they can improve their own lives.

"Because I am at the end of my life," Ma said.

Newswise
PRINT | EMAIL

Click Here!
To reduce voluntary turnover in the information technology field, managers should provide information technology employees with working conditions closely related to what they consider unique to their profession, researchers at the University of Arkansas suggest. Information technology employees consider their profession to be unique and expect employers to provide opportunities for job rotation, knowledgeable managers and colleagues, and a departmental disposition toward learning and change.

Margaret Reid and Myria Allen, professors in the departments of political science and communication in the J. William Fulbright College of Arts and Sciences, along with colleagues at Baylor University and Florida State University, have been researching human resource issues related to the information technology field for more than five years.

Why is the retention of good, qualified IT employees important?

“Organizations are becoming increasingly automated,” Allen said. “Companies may lay off employees in various positions, but they often seek to keep IT employees because those employees are able to use technology to retain elements of their company’s institutional memory that would otherwise be lost as employees leave the company.”

Work exhaustion, the desire to work in a place that allows for continual learning and change, a lack of knowledgeable managers and opportunities for cross training explain 30 percent of the variance in voluntary turnover intentions, the researchers found.

In its recent research, the team studied the retention of information technology employees in state governments. The team used the person-organization “fit” theory, which refers to the compatibility between employee expectations and the working conditions within the organization. “Fit” occurs when at least one entity provides what the other needs and they share similar fundamental characteristics.

When individuals perceive a positive “fit,” they will seek to maintain it; if there is a lack of “fit,” they will seek to establish one. But if they fail to achieve their desired level of correspondence, they will leave the job environment.

“When ‘fit’ is achieved, people stay,” Reid said. “The organization needs to create a good ‘fit:’ to find the right person for the right job. In IT, the team involvement is critical, and there is a need to ‘fit’ in an organization. Each person brings his or her personal skill set.”

The research team also found that gender differences emerged in their research.

“Retaining women in technology is difficult,” Allen said.

The need to retain female and state government information technology employees is particularly acute. Women increasingly are exiting, or not entering, the information system work field. Also, nearly 87 percent of state governments lack the information technology personnel they need, according to the literature cited in one of the research team’s papers.

Reid agreed.

It would be helpful for information technology managers to see why these employees are leaving, Reid said.

“Women are not gravitating in large numbers to the IT field,” she said. “There are a limited number of women in these programs and they leave the field quickly because of time demands or work-family conflicts.”

Their research showed that women in information technology are more likely to stay in the field if there is an opportunity to learn, get cross-training and have good managers.

Men were more likely to stay if they work in an organization that creates a working environment where employees can constantly learn and change.

Both sexes are more likely to leave if they experience work exhaustion due to work overload.

“IT employees are more likely to stay if the organizational environment is innovative, exciting and changing,” Allen said. “IT employees need to learn, grow and develop skills for their field of work. They want the opportunity to do that.”

The researchers found that state governments with strong information technology departments frequently use training and development opportunities as a way to increase retention of valued employees.

Information technology turnover also incurs economic costs alongside human ones. When an organization loses such an employee, critical knowledge is lost and may not be replaced.

In addition, when an information technology professional leaves a job, the remaining team members are hurt, the company is hurt and the financial cost is significant – from $20,000 to $100,000 to hire a new employee, Reid said.

“The productivity loss of IT employee turnover can last from three to 12 months,” Reid said. “The peak of productivity is not lost when a person leaves because a new person takes time to learn the job.”

The research team has researched multiple organizations in the private sector in the past, but for this study they focused on state governments.

The team investigated human resource issues in IT in four Fortune 500 companies, and gathered data from 498 employees located in 21 state government IT departments.

“This allowed us to get a better idea of what is actually going on across a variety of workplaces,” Allen said.

“We felt it was important to focus on state governments because state government is critical to most people’s everyday lives, unlike many private-owned companies,” she said. “Here, we are talking about agencies such as the Department of Human Services, the Department of Environmental Quality, the Revenue Department, etc.”

Reid is a professor and the chair of the political science department, and Allen is a professor in the department of communication.

SCHAUMBURG, Ill.--(BUSINESS WIRE)--Sparton Corporation (NYSE:SPA) today announced that John Payton has assumed the role of director of Corporate Information Technology (IT) effective today. Payton is responsible for the overall management of the Company’s IT department, including strategic planning and improving business processes. He will be based at Sparton’s corporate executive office in Schaumburg, Ill.

“Through his previous experience, John brings expertise in the area of systems integration, an important aspect of gaining and supporting corporate efficiencies, which will ultimately aid the Company in its scale-up efforts, ” said Cary Wood, president and CEO, Sparton Corp. “As part of his new responsibilities, John will be involved in the implementation surrounding the Company’s strategic growth plan. The addition of John further enhances the strength of Sparton’s leadership team.”

Prior to his current role, Payton served as director of Information Technology for FP Mailing Solutions. Previously, he was director of Information Technology at Edward Hines. Payton also served as manager of Information Technology at Elkay Manufacturing Company for more than 10 years. He began his career at Cybertech and Lutheran General Hospital, where he held the position of computer operations supervisor.

Payton holds a Masters of Business Administration degree in business from Keller Graduate School of Management. He received a Bachelor of General Studies degree in business and technology from Roosevelt University.

During his career, Payton has received several distinguished awards, most recently Activant’s “Best Use of Technology” in 2006.

About Sparton Corporation

Sparton Corporation (NYSE:SPA) now in its 109th year, is a broad-based provider of electronics to technology-driven companies in diverse markets. The Company provides its customers with sophisticated electronic and electromechanical products through prime contracts and through contract design and manufacturing services. Headquartered in Schaumburg, Ill., Sparton currently has four manufacturing locations worldwide. The Company's Web site may be accessed at http://www.sparton.com.

Safe Harbor and Fair Disclosure Statement

Safe Harbor statement under the Private Securities Litigation Reform Act of 1995: To the extent any statements made in this release contain information that is not historical, these statements are essentially forward-looking and are subject to risks and uncertainties, including the difficulty of predicting future results, the regulatory environment, fluctuations in operating results and other risks detailed from time to time in the Company's filings with the Securities and Exchange Commission (SEC). The matters discussed in this press release may also involve risks and uncertainties concerning Sparton's services described in Sparton's filings with the SEC. In particular, see the risk factors described in the Company's most recent Form 10K and Form 10Q. Sparton assumes no obligation to update the forward-looking information contained in this press release.

NCI Inc. said Monday it bought the outstanding capital stock of TRS Consulting Inc. to bolster its offerings for the intelligence community.

Financial terms of the transaction were not disclosed.

Reston-based TRS, which was founded in 2001, is a federal government focused information technology services and training company that employs 60.

“From a market positioning perspective, TRS has outstanding technical credentials and experience in supporting important national programs addressing some of the most critical missions in the Intelligence Community,” said Terry Glasgow, NCI’s president.

Reston-based NCI, which has approximately 2,600 employees and nearly 100 locations worldwide, provides a wide range of information technology services to U.S. federal government agencies.