What role leadership knowledge and skills play

Assignment Help Computer Networking
Reference no: EM131028407

Question:

Beyond Theory; What Leadership Concepts/Behaviors Exemplify a Successful IT Manager? Actions for ''Beyond Theory; What Leadership Concepts/Behaviors Exemplify a Successful IT Manager?''

As a basis for this Discussion, please review the Myers/Cox (2007) article found in your Presentation readings: See the article below: "How to develop value-added leadership." In your discussion you may wish to consider (but not be limited by) such issues as follows.

The IT manager as technician and/ or "people person."

Why some IT managers are likely to be successful and others fail.

The importance of identifying/ understanding both organizational and technical issues...as well as making decisions which solve, not create more, problems.

What role leadership knowledge and skills play.

The role of organizational "politics."

How does an IT manager actually learn the trade.

The article entitled "How to develop value-added IT leadership" is posted in the following paragraphs.

How to develop value-added IT leadership

By: Ken Myers and Sonya Cox (2007)

Meet Lynette, a seemingly super-charged IT supervisor. Her assigned turf is network administration, but she is often the first to pitch in on special projects, can habitually be found providing requested extra staff guidance and generally sets a highly motivated personal example within her unit. Thus, Lynette routinely displays certain highly desirable leadership characteristics which add more value to, and have greater impact on, unit performance and outcomes. Lynette is a ''value-added leader'' similar to several you can likely identity within your own organization. Look around, and you''ll find a number of workers at every level who consistently add value to your and other organizations by displaying desirable leadership characteristics. They ratchet performance and outcomes by demonstrating this distinctive leadership in at least four influential dimensions.

Self and others

Call value-added leaders "quiet revolutionaries." They are infectious self-starters who tend to influence others in work environments with their spirit and enthusiasm. They:

Project energy by providing task excitement and enthusiasm. Some may be quiet and unassuming, others raucous, but they are all can-do achievers -- models and catalysts for positive action. Their energy rarely leaves them content to sit on the sidelines.

Are involved without being obtrusive. They walk around nudging, assisting, helping, sharing information, and engaging others in the work processes. They actively promote teamwork and a sense of shared fate.

Embrace change by guiding, cajoling, and otherwise helping others travel the pathways of opportunity. They consistently encourage others to embrace positive expectations and to see emerging prospects.

Persuade and persevere by facilitating and influencing others to steadfast pursuit of purpose. With both straightforward and subtle strategies they limit blocking and are seen to turn others on to energetic purpose.

Awareness and choice

Value-added leaders keep the organization sharp by raising awareness of both problems and opportunities. They also help to prevent a "ready, shoot, aim" mindset where first or incomplete solutions are sometimes chosen without adequate analysis. They:

Look beyond the obvious and seek the reasoned choice among alternatives, then move to deliberate action.

Maintain perspective and help others to look beyond immediate boundaries and sense the big picture.

Promote learning by stressing the need to understand options. They nudge others to explore possibilities. They are persistent teachers of both knowledge and the spirit of inquiry.

Focus and integration

Organizations abound with unfocused activity; much of it never contributing to overall performance and success. Often the wheel is reinvented or something drops through the cracks as a result of political boundaries and a perceived need for turf protection. In sharp contrast, value-added leaders help to:

Target energy on opportunities by assisting organization members to establish priorities and jointly focus on high-promise activities and outcomes. They help to reduce the problem of too much opportunity and not enough direction by helping to identify, test, and prioritize alternatives.

Foster task linkage with others by creating a sense of common bonds as well as shared fate and opportunity. They work to break through the functional cages and silos of organizational life, helping others to see and comprehend the size and shape of the elephant entrusted to their care.

Influence cooperative action by turning fences into bridges. They realize that seeing common bonds will not always guarantee cooperative action. They hone influence and teamwork skills in themselves and others. And, they consistently share information, resources, even credit, in pursuit of common benefit.

Innovation and performance

Value-added leaders are not always heroes who make incredible advancements or engineer impossible IT feats. They are mostly ordinary folks who generate improvement bit by bit. They seem to always be pursuing small successes; "eating that elephant one bite at a time." They:

Are never satisfied that structures, processes, and outcomes are as good as they could or should be. They think in terms of continuous process improvement. At home with planned incremental change, they also appear to be tinkerers who adjust, try out, or test.

Support creativity by challenging others to invest time, talent, and resources in tasks. They value the insight that springs from careful examination, and they are excited by a unique or creative approach or by a challenging opportunity.

Take initiative and often turn "what if" into action. With little fanfare, they size up a situation, involve others, come up with a plan, and simply get on with it. They accept reasonable risks and rationally invest organizational resources in the pursuit of improvement while encouraging others to do so as well.

Stress a positive work environment and challenge themselves and others to maintain a motivating task setting. They model and coach caring interaction. They set new standards of quality performance in service to both internal and external customers.
How to promote value-added leadership

Not every supervisor in your IT group is likely to be imbued with all of the characteristics of a value-added leader. Yet, in surveying your organization, you are apt to find people who exhibit a host of these distinctive elements. Each of these behaviors can be recognized and shaped within an organization. Value-added leadership is a collection of learnable behaviors likely to profit your organization. We suggest considering three strategies:

First, look at your organization. You are liable to have keen but unheralded examples of value-added leaders already in your midst. Consider identifying and being a champion of these leaders, acknowledging their efforts and helping them to further succeed.

Second, as you screen for employment, promotions, and rewards, keep value-added leadership in mind.

Third, design and integrate value-added leadership learning modules into your organization''s training efforts. Much, if not all, value-added leadership behavior can be improved by determined organizational training.

If you want improved leadership and results in your IT organization, make value-added leadership your conscious organizational choice.

Verified Expert

IT managers support innovation techniques and spend time on creative tasks. They gives values to the creative approach. Thus, they focuses on initiatives and accepts challenges for improvements along with encouraging others to perform better. Exemplified IT manager’s looks for positive work culture and maintains the motivating goals. They focus on communication and develops good standards of quality management for both the internal as well as the external customers.

Reference no: EM131028407

Questions Cloud

Shorthand for independent and identically distributed : Suppose R is an orthogonal n×n matrix. If U is an n×1 vector of IID N(0, σ2) variables, show that RU is an n×1 vector of IID N(0, σ2) variables. Hint: what is E(RU)? cov(RU)? ("IID" is shorthand for "independent and identically distributed.")
Create a program that stores names in an array : In c++ create a program that stores names in an array. Also the program will end when "quit" is entered. Use a menu with the options: getName, sortName,displayName, findName, removeName.
Find the total number of possible arrangements : A set of 10 flags, 5 red, 3 blue and 2 yellow are to be arranged in a line along a balcony. If flags of the same colour are INDISTINGUISHABLE, find the number of arrangements in which,
Difference between a bonding radius and a nonbonding radius : Because an exact outer boundary cannot be measured or even calculated for an atom, how are atomic radii determined? What is the difference between a bonding radius and a nonbonding radius?
What role leadership knowledge and skills play : What role leadership knowledge and skills play - design and integrate value-added leadership learning modules into your organization''s training efforts.
Normal random variables with mean : Find an n×1 vector U of normal random variables with mean 0 and cov(U) = G. Hint: let V be an n×1 vector of independent N(0, 1) variables, and let U = G1/2V.
Draw an energy-level diagram to explain : Moseley's experiments on X-rays emitted from atoms led to the concept of atomic numbers Where exactly do these X-rays come from? Draw an energy-level diagram to explain.
Which lockers were open : A fourth student then changed every fourth locker, after which a fifth student changed every fifth locker , and so on until all 1000 students had passed by all 1000 lockers. At the end of this strange activity, which lockers were open?
What do now call the element mendeleev called eka-manganese : Mendeleev also predicted the existence of eka-manganese, which was not experimentally confirmed until 1937 because this element is radioactive and does not occur in nature. Based on the periodic table shown in Figure, what do we now call the eleme..

Reviews

Write a Review

 

Computer Networking Questions & Answers

  How client process in given end system can find location

Describe how client process in given end system can find location of given user to establish connection, for instance, Internet telephone, at given point in time.

  Question 1aregister the owasp top 10 web application

question 1aregister the owasp top 10 web application security risks for 2010.bwhy does software have to be intensively

  Produce a test plan for the new inventory system

Produce a report detailing how you will manage the transition to the new platform so as to assure the quality of the process and hence the outcome.

  What is value in the identification field and the ttl field

What is the value in the Identification field and the TTL field - How many fragments were created from the original datagram?

  Identifies nesess new network requirements

You are asked to produce a report that identifies NESES's new network requirements. You should suggest a network solution that demonstrates the appropriateness and suitability of your design.

  Description of the network components

Description of the network components

  How fast data be transferred between the computer and disk

Bandwidth (how fast can data be transferred between the computer and disk?)

  Assignment on subnetting

The calculations on how you get to the answers (50%). This is very important. If you don't provide the calculations or the way you get the answer, you will lose 50%.

  What capability does the dns server address provide

What capability does the DNS server address provide. What would happen if the computer was not configured to use a DNS server

  Different components difficult to incorporate into a network

Do you believe that a network with different types of computers, maybe different operating systems, or different components would be difficult to incorporate into a network. Why or why not.

  What are the demerits that this method poses for your

q1. why might read write and read create rights pose a security threat?q2. how do clients receive updates in the

  Question 1i give explanation for network securityii give

question 1i. give explanation for network securityii. give explanation security mechanismiii. what do you comprehend by

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd