This document summarizes a systematic review of publications related to Service Level Management for IT services in small settings. 31 relevant publications were identified from various sources. Information was extracted from these publications in a structured manner. The review found that Service Level Management is an important process for ensuring quality of IT services and is gaining more attention from organizations. However, more in-depth studies are still needed, especially for applying Service Level Management in small organizations.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
In recent years, market competitions and internal efficiency requirements derived many Information
Technology (IT) functions to shift their paradigms from IT asset management to IT service management
(ITSM). Consequently, a growing number of public and private organizations are implementing the ITIL
(IT Infrastructure Library) “best practice” as a framework for improving IT service management
processes. This paper presents an exploratory in-depth case study of two public service organizations in
the kingdom of Saudi Arabia deemed successfully implemented ITIL V3 processes. The case studies identify
several critical success factors (CSF) associated with ITIL implementation success. These CSF are then
compared with factors identified in the literature to shed light on success factors and challenges to offer a
learning experience for organizations currently undergoing or planning ITIL implementation.
Information System Success Framework based on Interpersonal Conflict Factors IJECEIAES
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
In recent years, market competitions and internal efficiency requirements derived many Information
Technology (IT) functions to shift their paradigms from IT asset management to IT service management
(ITSM). Consequently, a growing number of public and private organizations are implementing the ITIL
(IT Infrastructure Library) “best practice” as a framework for improving IT service management
processes. This paper presents an exploratory in-depth case study of two public service organizations in
the kingdom of Saudi Arabia deemed successfully implemented ITIL V3 processes. The case studies identify
several critical success factors (CSF) associated with ITIL implementation success. These CSF are then
compared with factors identified in the literature to shed light on success factors and challenges to offer a
learning experience for organizations currently undergoing or planning ITIL implementation.
Information System Success Framework based on Interpersonal Conflict Factors IJECEIAES
Information system success (ISS) has received considerable attention from researchers as it plays an important role in improving the efficiency and productivity of an organization. Several researchers have conducted empirical studies using numerous factors (e.g. organizational, technological, and individual factors) which affect the information system success. However, there are several factors which are related to interpersonal conflict which may affect information system success. The interpersonal conflict is a critical dimension which can greatly influence information system success in a competitive environment such as the financial sector. Therefore, this study introduces a framework to investigate the influence of interpersonal conflict factors on information system success in the Ministry of Finance, Yemen. The study employed a quantitative method which consists of the following steps: survey design, data collection and data analysis. A sample size comprising 130 employees were distributed in the Ministry of Finance, Yemen. Questionnaires were used to collect data from this sample. Data analysis (reliability, validity, correlation and factor analysis) has been carried out using SPSS. In addition, structural equation modelling (SEM) has been used for evaluation the research model. Based on the experimental results, the findings in this study revealed that the interpersonal factors (interference, disagreement and instability) significantly negatively (at 0.05 level of significance) influence user satisfaction of information system success.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Financial Management Information System within Government Institution and Sup...sececonf
The provision of comprehensive financial
information by the government institution is needed by
the wider community to boost the effectiveness of the
information to the society and government, and
decision-making. This system produces information that
is able to encourage the realization of a clean,
transparent, and able government to respond to
changing demands effectively. Therefore, the success of
the information system if the users are successful in the
model of acceptance of the systems and information
technology and it would be improving their
performance. This research aims to examine the
acceptance of regional financial information systems in
government using the Technology Acceptance Model
(TAM) and evidence of its influence on the
performance. The study found 556 respondents who are
civil servants in Lampung Province. The finding using
SEM analysis shows that all constructs have an effect in
conformity with the concept of TAM in a government
institution. This study reveals that all variables which
include the model of TAM theory have a positive impact
on the user's performance. It also improvesthe
effectiveness of the information system within the
government institution, especially the implementation of
the financial management information system.
Keywords-Financial Management Information System,
supply chain strategy, Technology Acceptance Model
(TAM), User’s Performance
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Toward innovative model based enterprise IT outsourcing (NGEBIS CAISE 2013)Dr.-Ing. Sagar Sunkle
Enterprises use IT systems to derive mechanical
advantage through automation of business process steps. Prevalent labor arbitrage outsourcing model has delivered significant
savings in run-the-business IT costs. For a variety of reasons,
change-the-business IT costs continue to be significantly high.
With continually increasing business dynamics and increasing
dependence on IT systems, the problem of managing these costs
with certainty is getting ever more difficult. We propose a model-
driven approach for addressing this problem. The paper discusses
current practice to motivate the problem, describes a model-
driven architecture to address the problem, and discusses various
research, engineering and business challenges for its realization.
Improvement of IT Governance Case Study Government Institution Region Xijtsrd
The use of information technology in government processes will increase the efficiency, effectiveness, transparency, and accountability of government administration. Utilization of IT within an organization requires a system to manage IT better as well as the required audit of information technology that can be run in accordance as the expected. IT Audit is an important matter that must be carried out within an organization, also including the Government Institution Region X which utilize the technology of information as supporting the process of the public servicing. The audit of information technology is carried out with the purpose of fixing the critical point or problems that often occur in the process within the institution. As the result of study using the framework of COBIT 5, it shows the level of capability of five IT processes selected are at a lower level, namely APO07 at the level 2, EDM04 at the level 1, DSS01 at the level 1, BAI01 at the level 1, and APO08 at the level 1, whereas the expectation of capabilities of the organization’s leader is at the level 4. The results of the audit of information technology that has been made, shows the difference of the level of gap between the current maturity level with the maturity level based on the organization’s leader. In this study, will be getting suggestions and improvement recommendations according to the framework of COBIT 5 and ITIL 2011. Agus Ade Muliyana Krisna | Gusti Made Arya Sasmita | Gusti Agung Ayu Putri "Improvement of IT Governance (Case Study: Government Institution Region X)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33496.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/33496/improvement-of-it-governance-case-study-government-institution-region-x/agus-ade-muliyana-krisna
Measuring Enterprise Resource Planning (ERP) Systems Effectiveness in IndonesiaTELKOMNIKA JOURNAL
Refining DeLone and McLean’s (D&M) information system model and technology-organisationenvironment
(TOE) framework, this research identifies the prominent factors that determine ERP system
success. Hypotheses are also drawn based on supporting theories to evaluate the causal relationship
between the success determinants. The level of achievement is measured by system quality, information
quality, service quality, external quality and top management support, which intermediated by perceived
usefulness and user satisfaction towards business benefits. To provide empirical evidence, 86 valid
samples out of 156 were collected using a web survey that targeted ERP users in Indonesia. Furthermore,
Partial Least Squares–Structural Equation Modelling (PLS-SEM) algorithm were applied to check the
proposed hypotheses. The results suggest system quality, information quality and service quality
significantly affect user satisfaction, whereas they moderately impact on perceived usefulness.
Interestingly, external pressures were reported as being the biggest influence on user satisfaction and
positively impacted on perceived usefulness. Despite being fairly predictive to perceived usefulness, top
management support along with general perceptual factors ultimately promote system success by
elevating business benefits.
Service-oriented computing has created new requirements for information systems development processes
and methods. The adoption of service-oriented development requires service identification methods
matching the challenge in enterprises. A wide variety of service identification methods (SIM) have been
proposed, but less attention has been paid to the actual requirements of the methods. This paper provides
an ethnographical look at challenges in service identification based on data from 14 service identification
sessions, providing insight into the practice of service identification. The findings identified two types of
service identification sessions and the results can be used for selecting the appropriate SIM based on the
type of the session.
Towards a Theoretical Model for Human Resource Management Information Systems...IOSRJBM
This study carries out a critical review of literature on human resource management information system, government policy and organization performance. The motivation for carrying out this literature review is presented and the point of contention is the application of human resource management information system, government policy and organizational performance. The objectives of carrying out this literature review include; to conceptualize the adoption of human resource management Information systems (HRMIS) and organization performance, to analyze the evolution of human resource information system (HRMIS) concept, to identify the theories upon which human resource information system (HRMIS) and organization performance are anchored upon, to critically review the empirical studies and identify the inherent gaps and to identify the factors that influences the adoption of HRMIS .The study reviews the origin of adoption of human resource management Information systems from both academic and management perspective. Factors influencing the adoption of human resource management systems, theoretical framework of human resource management systems whereby four theories namely diffusion theory, social capital theory, behavioral theory and resource based view theory have been discussed. An empirical review was done on thematic issues, methodology, data collection and data analysis. Various studies have been reviewed and analyzed to identify knowledge gaps. Conclusions were drawn and recommendations made based on the literature reviewed. A conceptual frame work alongside measures is proposed for studying human resource management information system, government policy and organizational performance and methodology for the study is also proposed.
Introduction to Information Systems Supporting 4th Edition Rainer Solutions M...Nortoner
Full download : http://alibabadownload.com/product/introduction-to-information-systems-supporting-4th-edition-rainer-solutions-manual/ Introduction to Information Systems Supporting 4th Edition Rainer Solutions Manual
Problem: Tough competition and demanding customers.
Solutions: Redesigned order and production processes reduce costs, increase revenue, and improve customer service.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Decision support systems, Supplier selection, Information systems, Boolean al...ijmpict
For organizations operating with number of products/services and number of suppliers, to select the right
supplier meeting all their requirements will be a challenging job. Such organizations need a good
decision support system to evaluate the suppliers effectively. Several decision support systems have been
reported to deal with complex selection process to decide the right supplier. Many mathematical models
have also been developed. This paper presents a new method, named as Bit Decision Making (BDM)
method, which treats such complex system of decision making as a collection and sequence of reasonable
number of meaningful and manageable sub-systems by identifying and processing the relevant decision
criteria in each sub-system. Help of Boolean logic and Boolean algebra is taken to assign binary digit
values to the selection criteria and generate mathematical equations that correlate the inputs to the output
at each stage of decision making. Each sub-system with its own mathematical model has been treated as a
standardized decision sub-system for that phase of making decision in evaluating suppliers. The sequence
and connectivity of the sub-systems along with their outputs finally lead to selection of the best supplier. A
real-world case of evaluation of information technology (IT) tenders has been dealt with for application of
the proposed method. The paper discusses in detail the theory, methodology, application and features of
the new method.
A detailed geological history of quartz and industrial minerals present in different localities of
Eritrea is given. Well-grown transparent quartz crystals reflecting the hexagonal crystallographic features and
isolated, irregular shaped small milky quartz stones are found in western suburb of Asmara and the area
between Molebso and Zara in central northern Eritrea. Mechanism of formation of growth features observed on
the habit faces of transparent quartz crystals is briefly explained. Micro-topographical studies carried out on
these crystals indicate that to begin with, they grow and develop under high supersaturating conditions.
Most of the milky quartz stones are observed to be generally randomly scattered and devoid of gold. However,
few such specimens having yellow colored dots on their surfaces contain gold particles. Energy dispersion of Xray
analysis (EDAX) indicates high content of gold to the tune of 48% present in such samples. Commercial
implications related to quartz bearing gold are discussed. It is proposed that gold exists in large quantity in
quartz veins deep beneath the surface of earth in this region.
Factor analysis as a tool for evaluation of spatial and temporal variations i...IOSR Journals
In this case study, factor analysis was applied for evaluation of temporal/spatial variations in the
groundwater quality of Aravakurichi block, Karur district, Tamil Nadu, India. This statistical technique was
employed for the better interpretation of large complex water quality data set obtained from twenty five
groundwater locations in four seasons during the year 2012. The water samples were characterized for the
physico-chemical parameters such as pH, total alkalinity, electrical conductivity, total hardness, calcium ions,
magnesium ions, total dissolved solids, fluorides, chlorides and sulphates. Factor analysis indicated four factors
initially and when rotation of the factor axis was executed, it yielded two factors with clear indication of high
loadings for some variable and low loadings for others, facilitating data interpretation in terms of original
variables. Overall, this case study demonstrated the effectiveness of factor analysis to identify marker variables
for assessing the chemistry of groundwater besides earmarking representative sampling stations to undertake
suitable water quality management in a shortest possible time.
Financial Management Information System within Government Institution and Sup...sececonf
The provision of comprehensive financial
information by the government institution is needed by
the wider community to boost the effectiveness of the
information to the society and government, and
decision-making. This system produces information that
is able to encourage the realization of a clean,
transparent, and able government to respond to
changing demands effectively. Therefore, the success of
the information system if the users are successful in the
model of acceptance of the systems and information
technology and it would be improving their
performance. This research aims to examine the
acceptance of regional financial information systems in
government using the Technology Acceptance Model
(TAM) and evidence of its influence on the
performance. The study found 556 respondents who are
civil servants in Lampung Province. The finding using
SEM analysis shows that all constructs have an effect in
conformity with the concept of TAM in a government
institution. This study reveals that all variables which
include the model of TAM theory have a positive impact
on the user's performance. It also improvesthe
effectiveness of the information system within the
government institution, especially the implementation of
the financial management information system.
Keywords-Financial Management Information System,
supply chain strategy, Technology Acceptance Model
(TAM), User’s Performance
Perceived significance of information security governance to predict the info...Irfaan Bahadoor
Abstract
Purpose – Information security is a growing concern in society, across businesses and government. As the offshore IT services market continues to grow providing numerous benefits, there are also perceived risks with respect to the quality of information security delivered in the supply chain. This paper aims to examine, as a case, the perceptions of Indian software services provider (service provider) employees with respect to information security governance and its impact on information security service quality that is delivered to customers.
Design/methodology/approach – The paper provides a framework built upon the existing
dimensions and instruments for total quality management and service quality, suitably modified to reflect the context of information security. SmartPLS, a structural equation modelling technique, has been used to analyse field survey data collected from across various Indian cities and companies.
Findings – Significant finding is that information security governance in an IT outsourcing company providing software services has a highly significant impact on the information security service quality,which can be predicted.The paper also establishes that there is a positive relationship collectively between elements of information security governance and information security service quality.
Research limitations/implications – Since data used in this study were taken solely from the responses of employees of outsourced service companies in India, it does not show if this translates into service improvements as perceived by the customer.
Practical implications – Information security governance should be made an integral part of corporate governance and is an effective strategic technique, if software outsourcing business enterprises want to achieve a competitive edge, provide client satisfaction and create trust.
Originality/value – The paper presents empirical data validation of the connection between information security governance and quality of service.
Toward innovative model based enterprise IT outsourcing (NGEBIS CAISE 2013)Dr.-Ing. Sagar Sunkle
Enterprises use IT systems to derive mechanical
advantage through automation of business process steps. Prevalent labor arbitrage outsourcing model has delivered significant
savings in run-the-business IT costs. For a variety of reasons,
change-the-business IT costs continue to be significantly high.
With continually increasing business dynamics and increasing
dependence on IT systems, the problem of managing these costs
with certainty is getting ever more difficult. We propose a model-
driven approach for addressing this problem. The paper discusses
current practice to motivate the problem, describes a model-
driven architecture to address the problem, and discusses various
research, engineering and business challenges for its realization.
Improvement of IT Governance Case Study Government Institution Region Xijtsrd
The use of information technology in government processes will increase the efficiency, effectiveness, transparency, and accountability of government administration. Utilization of IT within an organization requires a system to manage IT better as well as the required audit of information technology that can be run in accordance as the expected. IT Audit is an important matter that must be carried out within an organization, also including the Government Institution Region X which utilize the technology of information as supporting the process of the public servicing. The audit of information technology is carried out with the purpose of fixing the critical point or problems that often occur in the process within the institution. As the result of study using the framework of COBIT 5, it shows the level of capability of five IT processes selected are at a lower level, namely APO07 at the level 2, EDM04 at the level 1, DSS01 at the level 1, BAI01 at the level 1, and APO08 at the level 1, whereas the expectation of capabilities of the organization’s leader is at the level 4. The results of the audit of information technology that has been made, shows the difference of the level of gap between the current maturity level with the maturity level based on the organization’s leader. In this study, will be getting suggestions and improvement recommendations according to the framework of COBIT 5 and ITIL 2011. Agus Ade Muliyana Krisna | Gusti Made Arya Sasmita | Gusti Agung Ayu Putri "Improvement of IT Governance (Case Study: Government Institution Region X)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33496.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/33496/improvement-of-it-governance-case-study-government-institution-region-x/agus-ade-muliyana-krisna
Measuring Enterprise Resource Planning (ERP) Systems Effectiveness in IndonesiaTELKOMNIKA JOURNAL
Refining DeLone and McLean’s (D&M) information system model and technology-organisationenvironment
(TOE) framework, this research identifies the prominent factors that determine ERP system
success. Hypotheses are also drawn based on supporting theories to evaluate the causal relationship
between the success determinants. The level of achievement is measured by system quality, information
quality, service quality, external quality and top management support, which intermediated by perceived
usefulness and user satisfaction towards business benefits. To provide empirical evidence, 86 valid
samples out of 156 were collected using a web survey that targeted ERP users in Indonesia. Furthermore,
Partial Least Squares–Structural Equation Modelling (PLS-SEM) algorithm were applied to check the
proposed hypotheses. The results suggest system quality, information quality and service quality
significantly affect user satisfaction, whereas they moderately impact on perceived usefulness.
Interestingly, external pressures were reported as being the biggest influence on user satisfaction and
positively impacted on perceived usefulness. Despite being fairly predictive to perceived usefulness, top
management support along with general perceptual factors ultimately promote system success by
elevating business benefits.
Service-oriented computing has created new requirements for information systems development processes
and methods. The adoption of service-oriented development requires service identification methods
matching the challenge in enterprises. A wide variety of service identification methods (SIM) have been
proposed, but less attention has been paid to the actual requirements of the methods. This paper provides
an ethnographical look at challenges in service identification based on data from 14 service identification
sessions, providing insight into the practice of service identification. The findings identified two types of
service identification sessions and the results can be used for selecting the appropriate SIM based on the
type of the session.
Towards a Theoretical Model for Human Resource Management Information Systems...IOSRJBM
This study carries out a critical review of literature on human resource management information system, government policy and organization performance. The motivation for carrying out this literature review is presented and the point of contention is the application of human resource management information system, government policy and organizational performance. The objectives of carrying out this literature review include; to conceptualize the adoption of human resource management Information systems (HRMIS) and organization performance, to analyze the evolution of human resource information system (HRMIS) concept, to identify the theories upon which human resource information system (HRMIS) and organization performance are anchored upon, to critically review the empirical studies and identify the inherent gaps and to identify the factors that influences the adoption of HRMIS .The study reviews the origin of adoption of human resource management Information systems from both academic and management perspective. Factors influencing the adoption of human resource management systems, theoretical framework of human resource management systems whereby four theories namely diffusion theory, social capital theory, behavioral theory and resource based view theory have been discussed. An empirical review was done on thematic issues, methodology, data collection and data analysis. Various studies have been reviewed and analyzed to identify knowledge gaps. Conclusions were drawn and recommendations made based on the literature reviewed. A conceptual frame work alongside measures is proposed for studying human resource management information system, government policy and organizational performance and methodology for the study is also proposed.
Introduction to Information Systems Supporting 4th Edition Rainer Solutions M...Nortoner
Full download : http://alibabadownload.com/product/introduction-to-information-systems-supporting-4th-edition-rainer-solutions-manual/ Introduction to Information Systems Supporting 4th Edition Rainer Solutions Manual
Problem: Tough competition and demanding customers.
Solutions: Redesigned order and production processes reduce costs, increase revenue, and improve customer service.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Decision support systems, Supplier selection, Information systems, Boolean al...ijmpict
For organizations operating with number of products/services and number of suppliers, to select the right
supplier meeting all their requirements will be a challenging job. Such organizations need a good
decision support system to evaluate the suppliers effectively. Several decision support systems have been
reported to deal with complex selection process to decide the right supplier. Many mathematical models
have also been developed. This paper presents a new method, named as Bit Decision Making (BDM)
method, which treats such complex system of decision making as a collection and sequence of reasonable
number of meaningful and manageable sub-systems by identifying and processing the relevant decision
criteria in each sub-system. Help of Boolean logic and Boolean algebra is taken to assign binary digit
values to the selection criteria and generate mathematical equations that correlate the inputs to the output
at each stage of decision making. Each sub-system with its own mathematical model has been treated as a
standardized decision sub-system for that phase of making decision in evaluating suppliers. The sequence
and connectivity of the sub-systems along with their outputs finally lead to selection of the best supplier. A
real-world case of evaluation of information technology (IT) tenders has been dealt with for application of
the proposed method. The paper discusses in detail the theory, methodology, application and features of
the new method.
A detailed geological history of quartz and industrial minerals present in different localities of
Eritrea is given. Well-grown transparent quartz crystals reflecting the hexagonal crystallographic features and
isolated, irregular shaped small milky quartz stones are found in western suburb of Asmara and the area
between Molebso and Zara in central northern Eritrea. Mechanism of formation of growth features observed on
the habit faces of transparent quartz crystals is briefly explained. Micro-topographical studies carried out on
these crystals indicate that to begin with, they grow and develop under high supersaturating conditions.
Most of the milky quartz stones are observed to be generally randomly scattered and devoid of gold. However,
few such specimens having yellow colored dots on their surfaces contain gold particles. Energy dispersion of Xray
analysis (EDAX) indicates high content of gold to the tune of 48% present in such samples. Commercial
implications related to quartz bearing gold are discussed. It is proposed that gold exists in large quantity in
quartz veins deep beneath the surface of earth in this region.
Factor analysis as a tool for evaluation of spatial and temporal variations i...IOSR Journals
In this case study, factor analysis was applied for evaluation of temporal/spatial variations in the
groundwater quality of Aravakurichi block, Karur district, Tamil Nadu, India. This statistical technique was
employed for the better interpretation of large complex water quality data set obtained from twenty five
groundwater locations in four seasons during the year 2012. The water samples were characterized for the
physico-chemical parameters such as pH, total alkalinity, electrical conductivity, total hardness, calcium ions,
magnesium ions, total dissolved solids, fluorides, chlorides and sulphates. Factor analysis indicated four factors
initially and when rotation of the factor axis was executed, it yielded two factors with clear indication of high
loadings for some variable and low loadings for others, facilitating data interpretation in terms of original
variables. Overall, this case study demonstrated the effectiveness of factor analysis to identify marker variables
for assessing the chemistry of groundwater besides earmarking representative sampling stations to undertake
suitable water quality management in a shortest possible time.
Batch Thermodynamics and Kinetic Study for Removal of Cationic Dye from Aqueo...IOSR Journals
Abstract: Model using Iraqi limestone as an adsorbent has been investigated. The influences of equilibrium time, limestone dosage, limestone particle size, pH of solution, adsorption isotherms and temperature on adsorption performance have been experimentally verified by a batch method. The adsorbent used in this study exhibited a good adsorption potential at initial pH 10, temperatures 28ºC, particle size 75 μm, limestone dosage 0.1g for equilibrium time 140 min. The removal efficiency and distribution coefficient have also been determined for the adsorption system as a function of dosage of the adsorbent. The experimental results are described by Langmuir and Freundlich isotherm models. Experimental results show that the kinetic model of pseudo-second order provided a good description of the whole experimental data more than the kinetic of the Lagergren-first order.
Properties of CdS Chemically Deposited thin films on the Effect of Ammonia Co...IOSR Journals
The effect of ammonia concentration on electrical properties, optical properties and structural properties of chemical bath deposited (CBD) Cadmium sulphide (CdS) thin films has been revealed. The films were prepared by using cadmium acetate as cadmium ion (Cd2+) source, thiourea as sulphur ion (S2-) source and ammonia as the complexing agent. Ammonia concentration was changed from 0.1 M – 3.0 M. Ammonia concentration at 2.0 M uniform, dense and continuously coated films were obtained. Not only typical cadmium-pure but also unusual sulphur deficiency phenomena were observed for CBD CdS thin films. In the present investigation, the carrier concentration varied form 1.831X106cm-3 to 1.026X106cm-3 when ammonia concentration is changed from 0.5M to 2.5 M. The direct band gap energy at 0.5M is 1.92eV while at 2.5M is 2.65eV. The surface morphology of as deposited thin films is almost smooth and no grains were observed clearly at low molar concentration and predominant grains at the concentration of ammonia is 2.0M. By estimated Cd:S ratio value is found to be 1.04 by using EDAX. The thin film deposited at 2.0M concentration shows the highest degree crystallinity. The formation mechanism of the films with various ammonia concentrations is discussed.
Balking and Reneging in the Queuing SystemIOSR Journals
In this paper, we have discussed about a steady state solution of the ordered queuing problem with balking and reneging. Here we have taken the waiting line is of chi-square queue with Poisson balking probability which depend not only on the number of customers in the system, but also the rate of services in the system.
On The Use of Transportation Techniques to Determine the Cost of Transporting...IOSR Journals
This paper aims at identifying an effective and appropriate method of calculating the cost of transporting goods from several supply centers to several demand centers out of many available methods. Transportation algorithms of North-West corner method (NWCM), Least Cost Method (LCM), Vogel’s Approximation Method (VAM) and Optimality Test were carried out to estimate the cost of transporting produced newspaper from production center to ware-houses using Statistical software called TORA. The results revealed that: NWCM = 36,689,050.00, LCM = 55,250,034.00, VAM = 29,097,700.00 and Optimal solution = 19,566,332.00. It was discovered that Vogel’s Approximation method gives the transportation cost that closer to optimal solution. Also, the study revealed that a production center should be created at northern part of Nigeria to replace the dummy supply center used in the analysis, so as to make production capacity equal to requirement.
Capacity Spectrum Method for RC Building with Cracked and Uncracked SectionIOSR Journals
one of the most widespread procedures for the assessment of building behavior, due to earthquake, is the Capacity Spectrum Method (CSM). In the scope of this procedure, capacity of the structure compares with the demands of earthquake ground motion on the structure. The capacity of the structure is represented by a nonlinear force-displacement curve, referred to as a pushover curve. The base shear forces and roof displacements are converted to equivalent spectral accelerations and spectral displacements, respectively, by means of coefficients that represent effective modal masses and modal participation factors. These spectral values define the capacity spectrum. The demands of the earthquake ground motion are represented by response spectra. A graphical construction that includes both capacity and demand spectra, results in an intersection of the two curves that estimates the performance of the structure to the earthquake. In this study, for determination of the performance levels, G+10 R.C.C. Building with cracked and uncracked section were taken. The structural Capacity of cracked and uncracked section compared with performance point value, which shows the structural capacity of building having cracked section is lesser than the uncracked section. Different modeling issues were analyzed to study the effect on Capacity of the structure with cracked and uncracked section for different position of Shear wall.
Study the effect of alpha particle fluences on the morphology and optical pro...IOSR Journals
Poly-aniline is one of the most important conducting polymers. The poly-aniline has many applications in the electronic fields such as batteries, sensors, controlling systems and organic displays. It is good environmental stability, easy conductivity control and cheap production in large quantities. In this study poly-aniline samples in nan-structure were irradiated with α- particles with different fluences (1.16 x 108- 1.20 x 109 alphas/ cm2) and constant energy (5.32±0.23 MeV). The damage is almost regular along the path length of alpha particles in poly-aniline samples. The modifications in the morphology and optical properties induced by the radiation were measured. It was found a strong correlation between absorbance and the alpha particle fluences at wavelength 600 nm for the samples after irradiations. Also, the results showed increase the number of carbon atoms per cluster in the poly-aniline samples after irradiations.
Physiological, Biochemical and Modern Biotechnological Approach to Improvemen...IOSR Journals
Rauwolfia serpentina also known as Sarpagandha (Apocynaceae) is an integral part of Ayurvedic medical system in India for over centuries for the treatment of various ailments. The leaves and roots ofRauwolfiaserpentina contain alkaloids which are secondary metabolites. Major alkaloids identified are Reserpine, Rauwolfine, Serpentine, Sarpagine, Ajmaline, Yohimbine and Ajmalicine.The present paper is an overview of the studies concerning with physiological, biochemical and modern biotechnological approach to improvement of Rauwolfiaserpentina.
Dietary Supplementation with Calcium in Healthy Rats Administered with Artemi...IOSR Journals
Reports on the role of calcium on predisposition to cardiovascular disease have been rather inconsistent while studies on its interaction with other medications are ongoing. We therefore investigated the effect of separate and combine administration of calcium supplement with artemisinin-based combination drug on hepatic and serum lipid profile. Thirty two male wistar rats were randomly assigned into four groups of eight rats each. The control (group A) received normal saline. Group B and D were placed on 10mg/Kg calcium twice daily for four weeks. On the thirtieth day, therapeutic dose of artemisinin-based combination was simultaneously administered to group C and group D twice daily for three days. All the rats were then sacrificed after 12 hours fasting, blood was withdrawn and the liver removed and homogenized in an appropriate buffer. Biochemical analysis showed no significant (p>0.05) variation in hepatic triaacylglycerol in all the treated groups whereas calcium supplementation was observed to induce a significant (p<0.05) reduction in hepatic cholesterol. Significant elevations due to calcium supplementation were also observed in serum total cholesterol, LDL cholesterol level and atherogenic risk index with a concomitant reduction in serum HDL cholesterol. No significant change was observed in serum total cholesterol, triacylglycerol and serum lipoproteins in all other treatment groups. Our study suggests that calcium supplementation may predispose to cardiovascular disease and that its co administration with ACT may not aggravate nor reduced the predisposition risk.
Comparative Study of End Moments Regarding Application of Rotation Contributi...IOSR Journals
Abstract: Analysis of portal frames involves lot of complications and tedious calculations by conventional
methods. To carry out such analysis is a time consuming task. The rotation contribution method i.e. Kani’s
Method & Moment Distribution Method for analysis of portal frames can be handy in approximate and quick
analysis so as to get the detailed estimates ready. In this work, these two methods have been applied only for
vertical loading conditions. This paper presents the analysis of portal frame, considering mainly the case of
single bay portal frame, which is the most common in practice. The Kani’s method is self correcting, that is, the
error, if any, in a cycle is corrected automatically in the subsequent cycles. The checking is easier as only the
last cycle is required to be checked. The convergence is generally fast. It leads to the solutions in just a few
cycles of iterations.
A Comparison between Natural and Synthetic Food Flavoring Extracts Using Infr...IOSR Journals
Food is the basic necessity of life. One works hard and earns to satisfy our hunger .But at the end of the day, many of us are not sure of what we eat. We may be eating a dangerous flavors and dyes. Often, we invite diseases rather than good health. The purpose of this article is to detect the presence of food adulterants in some common foods and to create awareness about the artificial tests and dyes. A study of the IR spectra and the optical activitiy of two natural and artificial most common used flavor and colors (Vanilla and Strawberry) were detected. IR spectra of synthetic Vanilla were dominated by specific peaks that attributed to corresponding synthetic pigments (specific spectral band of stretching C=0 ester of aldehydic and ketonic groups in synthetic flavor at1744.87cm-1 with a weak shoulder at1700 cm-1 .And stretching CO of sucrose at (990.49 and 923,70) cm-1.The synthetic Strawberry characterized with specific spectral bands of (C=O stretching at 1634.96 cm-1 in ester and CO stretching of sucrose at 925 cm-1), while these functional groups disappeared in natural. Vanilla and Strawberry extracts. The natural Flavoring extracts posse's levorotatory property; they are optically active, while the synthetic extracts not rotates the plane of polarization of the light which passes through the material, they are said to be; not active optically. The obtained results indicated that, Infrared spectrum and Optical activity could be adapted to detect adulterants added products, and to differentiate between natural and artificial food flavoring extracts.
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
Today, the function of the chief information officer (CIO) has become part of the flow charts of many Moroccan companies [1]. Based on this statement, we did an empirical study in the first part of this work on the state of information systems (IS) Moroccan to know their strengths and weaknesses. The aim of the second part is to propose an approach based on the IT (information technology) frameworks helping CIOs to form their own repository of good practices to be applied in order to have good IT governance.
IT Service Management System Measurement using ISO20000-1 and ISO15504-8: De...IJECEIAES
Information technology is about not only hardware, software, communication infrastructure and communication infrastructure but also how to manage services. Information technology plays an increasingly important role in developing the structure and functions of public and private sectors. Service measurement plays an important role in IT service management (ITSM) that is one of the subfields of Services Computing science. ITSM is a big part of service science, a science field that combines computer science, operation research engineering, business strategy, management science, and organizational theory. Performance measurement from each of IT services is absolutely needed and is important in the continuous development of ITSM. These research provide good technical knowledge about the measuring ITSM with some requirements. In this paper we suggest the metrics in each service processes enables organizations to predict a direction for active process enhancement and to identify if the goal of process can achieve. This objective process metrics based on ISO/IEC 15504-8 and PRM ISO/IEC 20000-4 refinement. The output of this research, in the form of metrics and tools for any type organizational use.
Requirement analysis method of e commerce websites development for small-medi...ijseajournal
Along with the growth of the Internet, the trend shows that e-commerce have been growing significantly in
the last several years. This means business opportunities for small-medium enterprises (SMEs), which are
recognized as the backbone of the economy. SMEs may develop and run small to medium size of particular
e-commerce websites as the solution of specific business opportunities. Certainly, the websites should be
developed accordingly to support business success. In developing the websites, key elements of e-commerce
business model that are necessary to ensure the success should be resolved at the requirement stage of the
development. In this paper, we propose an enhancement of requirement analysis method found in
literatures such that it includes activities to resolve the key elements. The method has been applied in three
case studies based on Indonesia situations and we conclude that it is suitable to be adopted by SMEs.
A CASE STUDY OF RESEARCH IMPROVEMENTS IN AN SERVICE INDUSTRY UPGRADING THE KN...ijaia
In this paper is analyzed a case study of an upgrade of an industry communication system developed by following ‘Frascati’ research guidelines. The goal of the proposed model is to enhance the industry knowledge Base –KB- by acting directly on information communication system improvements and data system integration, enabling automated process and data processing. The paper follow all the steps performed during the project development: the preliminary data infrastructure design, the information infrastructure improvements, and data processing. Data processing is performed by a calculus engine embedding data mining association rules and Artificial Neural Network –ANN- predictive algorithms thus improving the research. The calculus engine has been implemented by a multiple variables model where the contract data are preliminary processed in order to define functions classifying the operation processes and activating automatically the service process management. The business intelligence –BI- operations are performed mainly by the calculus engine optimizing industry performances. The goal of the paper is to show how research and development –R&D- can be applied by gaining and optimizing the knowledge and processes of an Italian industry working in car services. The project has been developed with the collaboration of the industry ACI Global working in roadside assistance services. By means of a research project resources, the information technology –IT- infrastructure has been improved by new solutions of the communication system and of the data transfer. The proposed case of study provides a model and a guideline to follow in order to apply research in industry acting directly on data and information network.
The implementation of IT governance is important to lead and evolve the information system in agreement with stakeholders. This requirement is seriously amplified at the time of digital area considering all the new technologies that has been lunched recently (Big DATA, Artificial Intelligence, Machine Learning, Deep learning...). Thus, without a good rudder, every company risks getting lost in a sea endless and unreachable goals.
This paper aims to provide decision-making system that allow professionals to choose IT governance framework suitable to desired criteria and their importance based on a multi-criteria analysis method (WSM), we did implement a case study based on our analysis in a Moroccan company. Moreover, we present better understanding of IT Governance aspects such as standards and best practices.
Our article goes into a global objective that aims to build an integrated generated meta-model for better approach of IT Governance.
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...ijait
In the competitive environment, companies have given increasing importance to the IT sector and the
resources it delivers as strategic. As a result, IT becomes a living being within the company. This sector is
being subject to continuous changes in this scenario. These changes can occur within the own IT sector or
whether IT to other sectors of the company. For both scenarios, it is important to have a good change
control to avoid unnecessary trouble and expense. This paper aims to show through a case study, the
benefits and results obtained with the implementation of a process of managing and controlling changes in
the information technology environment of a large government company in Brazil.
“IT SERVICE MANAGEMENT SYSTEM FOR CENTRAL BANK OF SUDAN”IJMIT JOURNAL
IT Service Management System is an application to implement and manage Information Technology
Infrastructure Library (ITIL) best practices framework. This framework aims to align the IT services with
the business needs by insuring the quality of services provided to business. This IT service Management
system links people, processes and technology within the Central Bank of Sudan as the main site of the
project.
The Central Bank of Sudan is the main bank that governs Sudan's banks rules and regulations. The bank
was formed in 1960 with headquarters located in the Khartoum capital of Sudan in addition to eighteen
(18) branches spread throughout the country. The Information Technology Administration within the
Central Bank of Sudan manage and operate the IT infrastructure that host and support all systems that
used internally and for external banks.
The objective of this study focused on finding IT service management system that can support international
IT service management platform that can apply ITIL standard processes like Incident Management, Service
Request Management, Problem Management, Change Request Management, Configuration Management
Database and Knowledge Management.
The methodology used in this system is the Rapid Application Development (RAD), a condensed
development process that produces a high quality system with low investment costs.
The proposed system went through to alpha, beta and acceptability tests by IT development team first and
second line of support agents to ensure proper module functionality with favorable results.
The study concluded in align services provided by the Information system department with business need
through manageable and controllable standard. As a recommendation, the system should be implemented
at the Central Bank of Sudan. More integrations and benchmarking must be done to ensure modules
functionalities and higher security. The system can be the first step to take ISO20000 certificate as it covers
many of IS020000 requirements.
IT SERVICE MANAGEMENT SYSTEM FOR CENTRAL BANK OF SUDANIJMIT JOURNAL
IT Service Management System is an application to implement and manage Information Technology Infrastructure Library (ITIL) best practices framework. This framework aims to align the IT services with the business needs by insuring the quality of services provided to business. This IT service Management system links people, processes and technology within the Central Bank of Sudan as the main site of the project.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
N18030594102
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. V (May-Jun. 2016), PP 94-102
www.iosrjournals.org
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 94 | Page
Service Level Management For it Ser-Vices in Small Settings: A
Systematic Review
Calvo-Manzano Jose1
, Cuevas Gonzalo1
, Gómez Gerzon2
, Mejía Jezreel1
,
Muñoz Mirna1
, Rabbi Md Forhad1
, San Feliu Tomás1
1
Universidad Politécnica de Madrid, Facultad de Informática {joseantonio.calvomanzano, gonzalo.cuevas,
ma.munoz, tomas}
2
Universidad Autónoma de Tamaulipas, Unidad Reynosa Rodhe
Abstract: This work presents the application of a systematic review protocol for Software Engineering. This
protocol is used as a formal model by applying systematic review to Service Level Man-agement. The objective
is to search for papers related to Service Level Management for IT Services in small settings (including small
and medium enterprises). Results obtained show that Service Level Management area is an increasing research
field and there is a need for more in-depth studies.
Keywords: Slm, Itsm, Small Settings, Systematic Review, IT Services.
I. Introduction
Nowadays, most countries have transitioned from agriculture and manufacturing economies to service
based economies. More than 75% of the economies of industrialized nations are based on business services [1].
According to the document “Capability Maturity Model Integration for Service (CMMI-SVC) Overview”
published by Software Engineering Institute [2], demand for process improvement in services is likely to grow:
services constitute more than 80% of the US and global economy. According to Gartner [3], 80% of the cost of
an infrastructure is in service delivery and service support. There-fore, services are gaining significant
importance day by day in industry.
Hence, industries need some sort of framework, standards to manage their services, specially the IT
Services, because the development of IT has had a greater impact in the processes of businesses in the last years
[9]. For this reason, IT Service Management (ITSM) has been developed. ITSM is a discipline for managing
information technology systems, philosophically centered on the customer's perspective of IT's contribution to
the business. The IT infrastructure needs to be aligned to the busi-ness requirements such that business unit and
IT operate in a coordinated effort to achieve the goal of the organization. There are different frameworks for
ITSM. Standards, process and evaluation models or framework help organizations to improve the management
of their services projects. Some public framework and standards assessed relevant to service management are:
ISO/IEC 20000 [13], Infor-mation Technology Infrastructure library (ITIL) [5], Capability Maturity Model
Integration for Services (CMMI-SVC) [2], Control Objectives for Information and related Technology (COBIT)
[8], eSourcing Capability Model for Service Providers (eSCM-SP) [4].
The previous models consider the IT Services from large companies’ perspective. But the fact is,
nowadays small companies are gaining more importance. In Spain, according to Central Business Directory
(DIRCE) [14], most companies are categorized as Small and Medium Enterprises (SMEs). In January of 2007,
99,81% of businesses, representing three million enterprises were small or medium. This statistic shows the
importance that SMEs have in microeconomics (see Table 1).
Due to previous issues, a growing number of organizations are focusing on Service Level Manage-
ment (SLM) process to determinate the level of IT Services that is needed to support the services offered. SLM
provides an approach combining process management and industry best practices to ensure that the required and
cost justifiable service quality is maintained and gradually improved [5]. As a result, SLM becomes a key
concern nowadays.
This work addresses SLM process, from the point of view of small settings (include SMEs). Section 2
shows the importance of Service Level Management for IT Services. Section 3 and 4 describes the Systematic
Review Method applied in this research work. Section 5 shows the results obtained. Finally, section 6
establishes a brief summary.
II. Importance of Service Level Management for IT Services
SLM is a vital process for every IT service provider organization in that it is responsible for agreeing
and documenting service level targets and responsibilities within Service Level Agreements (SLAs) and Service
Level Requirements (SLRs), for every activity within IT [6].
2. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 95 | Page
Moreover one of the important processes to regulate the qualities and to decrease the cost of IT ser-
vices is the Service Level Management [15]. Also the ITSM models, standards and proposals give high
importance to Service Level Management in the IT Service Management context.
The main factors to carry out this research focused in a systematic review for SLM from the point of view of
small settings are:
• The growing current trend to acquire Technology and IT Services derivate of this acquisition by
organizations [16].
• The importance of IT Service Management in small settings.
• The absence of models that help to implement the Service Level Management process in the con-text of the
IT Service Management for Small Settings.
The statistics compiled by the National Statistical Institute (INE) and the Central Business Directory
[8], show that small companies represent the highest percentage. The data are linked to factors such as income
and sectorial concentration of such companies. The INE and DIRCE analyze their situation within the European
Union and their relationship with the employees they recruit.
Table 1 summarizes the study for Spanish companies based on the employee stratum and total per-
centage [8]. The interest in showing this study is due to the current importance that small companies have.
Micro-enterprise Small Medium Large Total SMEs
3,137.46 169.60 23.52 6.07 3,336.66 3,330.58
94,03% 5,08% 0,70% 0,18% 100% 99,818%
Table 1. Spanish Companies (employee’s stratum and total percentage).
Systematic review gives a summary of the state of the art for this specific topic. In this case for IT Ser-
vices Management in small settings. In addition systematic review identifies the existing gap in some topics
related with SLM in SMEs. This results can help users who are working with SLM or can help to know current
initiatives in this domain.
III. Description of Systematic Review Method
3.1 Systematic Review Background
Integration of research results was introduced for the first time in twenty century. In 1904, Pearson
calculated the average of correlations between the typhoid fever inoculation and morality. Then, sys-tematic
review began to be formalized and at the end of the 80’s systematic review achieves legiti-macy as a field of
research [10]. Later, Kitchenham [11] evolutes the idea of Evidence-Based Software Engineering and proposes
a guideline for systematic reviews that is appropriate for software engineer-ing researchers.
3.2 What is a Systematic Review
Systematic Review (SR) is used to refer to a specific methodology of research, developed in order to
gather and evaluate the available evidence pertaining to a focused topic [10]. This is the process of summarize
all existing information about a phenomena in thorough and empirical way. At the end, systematic review draws
a general conclusion from individual studies on any phenomena.A systematic type of review follows a very well
defined and strict sequence of methodological steps. A systematic review begins when researchers are confident
that it is necessary to carry it out. It aims to integrate empirical research in order to create generalizations. In this
regard, defined assessment objectives, reference source, data extraction method are some of the aspects
contained in the proto-col used for this systematic review [10].
3.3 Protocol Description
Biolchini et al [10] have drawn up a proposal for how to conduct a systematic review focused on Soft-
ware Engineering adapting it from other study area such as medicine. Hence, for this work, the protocol
proposed is applied to the “Service Level Management for IT Ser-vices in small settings: a Systematic Review”.
IV. Prototype Development
Next, the prototype development used for the systematic review of the subject is presented: Service
Level management for IT Services in small settings.
4.1 Question Formulation
The systematic review objective should be clearly established in order to formalize the question:
4.1.1 Question Focus
The systematic review is carried out to identify initiatives and experience reports on Service Level Management
for IT Services in small settings.
3. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 96 | Page
4.1.2 Question Quality and Amplitude
This section aims at defining the syntax of the research question (the context in which the review is
applied and the question the study must answer) and its semantic specificity (or question range) de-scribed by
the remaining items of this section - intervention, effect, outcome mesasure, population and application. Next,
each of them are described [10] specifically for Service Level Management for IT Services in small settings.
• Problem: Service Level Management (SLM) is a vital process for every IT service provider organi-zation in
that it is responsible for agreeing and documenting service level targets and responsibili-ties within SLAs
and SLRs, for every activity within IT. SLM implementation is needed to ensure that an agreed level of IT
service is provided for all current IT services, and that future services are delivered to agreed achievable
targets [5].
• Question: What initiatives have been carried out to evaluate processes for Service Level Mana-gement in IT
service context?
• Intervention: Service Level Management for IT Services in small settings.
• Effect: Service Level Management initiatives and proposals for IT services in small settings.
• Outcome measure: Number of identified initiatives.
• Population: Publications related to Service Level Management, IT Services and small settings
• Application: Organizations that use IT services and those who provide them.
• Experimental Design: None experimental design will be performed.
4.2 Source Selection
The objective of this section is to select the sources where the primary studies will be executed [10].
To perform the selection the author of the systematic review protocol proposes to address the follow-ing issues:
4.2.1 Source Selection Criteria Definition
• Use search mechanism with keywords and sites suggested by experts.
• Use papers recommended by other experts.
• Use papers available on the website.
4.2.2 Studies Language
• English.
4.2.3 Source Identification
Sources Search. The identification of sources has been based on the criterion of experts in our re-search
area. These sources include journals as: European Journal of Operational Research, Informa-tion and Software
Technology, Software: Practice and Experience, Software Process: Improvement and Practice, IEEE Software,
Software Technology and Engineering Practice, Computer and research workshops & technical reports of
Software Engineering Institute – SEI, among others.
Search Strings. Keywords from the word set defined in the question were extracted. Combining these keywords
with the logical operators “AND” and “OR”, two search strings were obtained (see Table 2). These search
strings have been adapted for each web browser of the sources.
Table 2. Search strings
Source List. These sources have been selected taking into account the defined source search method
(see Table 3).
Table 3. Search strings
4. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 97 | Page
4.2.4 Source Selection After Assestment
First, it was evaluated if the sources fit all defined criteria. Initially, the complete list is right. After ap-
plying the search string to all sources, it was found that some items were common in the IEEE Com-puter
Science Digital Library and ACM sources.
4.2.5 Reference Checking
Three researchers from the Research Group of Software Process Improvement for Spain and Latin American
Region evaluated the sources list obtained from the previous section and determined, at first instance, all
references as approved.
4.3 Studies Selection
In this systematic review an iterative and incremental procedure is used for studies selection: a) Itera-
tive, to group all activities that could be repeated during the procedure, and b) Incremental, because the studies
are approached and recorded one by one until obtaining the systematic review results [12]. This iterative and
incremental procedure is used due to its functionality in other systematic reviews. This section describes the
process and criteria for studies selection and evaluation.
4.3.1 Studies Definition
The studies inclusion (IC) and exclusion criteria (EC) definitions [11] are as follows:
Acronym Criteria Description
IC1 Include papers whose title is related to Service Level
Management and IT Services and small settings
IC2 Include papers that contains keywords that match with
those define in the search string
IC3 Include papers whose abstract is related to the topic
considered
IC4 Include papers after partial or total reading
EC1 Exclude those papers that do not match with the previ-
ous inclusion criteria
EC2 Exclude all duplicate papers
Table 4. Studies inclusion and exclusion criteria definition
Studies Types Definition. Initially all studies related to Service Level Management will be taken into
account. However, the greatest interest will focus on studies that show results on Service Level Man-agement
for IT services in small settings.
Procedures for studies selection. With regards to the selection criteria, the title was initially the main
criterion; nevertheless, in some cases it did not provide enough information, thereby reading the summary of
each of them was necessary and in some cases a review of the full text was required.
4.3.2 Selection Execution
• Initial Studies Selection. At first a search execution was conducted to verify the parame-ters used by each
engine and adapt search string to them. Table 5 shows in the column “Found” the obtained value.
• Study Quality Evaluation. To determine the quality of the study, some participants of the research group,
applying IC and EC, obtained the primary studies (see Table 5).
Sources Search date Found Primary studies
IEEE 05/11/09 59 11
ACM 05/11/09 12 3
Springer 05/12/09 59 12
Science@Direct 05/13/09 42 3
SEI 05/14/09 10 3
Total 182 31
process
Next, a quality study is evaluated to obtain the assessment results that permit us to quantify those
studies that effectively support the stated objectives. The previous information constitutes the study basis for
following the systematic review process, and checking the quality of the study.
4.4 Information Extraction
This section begins once primary studies are selected. Then, in this section, extraction criteria and
result are described
5. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 98 | Page
4.4.1 Information Inclusion (ICinf) and Exclusion (ECinf) Criteria Definition
Acronym Criteria Description
IC1inf Collect Information about the organization’s trend re-
spect to service level management.
IC2inf Classify processes followed by companies for IT ser-
vice management.
IC3inf Identify proposed methodologies, methods and proce-
dures in studies for IT service management
EC1inf Exclusion the information that is not related to the in-
clusion criteria defined above.
Table 6. Information Inclusion and Exclusion Criteria Definition
4.4.2 Data Extraction Forms
To analyze data and information submitted in selected studies, relevant remarks of the main studies
ideas were made and recorded in a document with a sequence number identification that matches with the
sequential paper number given when it was stored a primary study.
4.4.3 Extraction Execution
Objective Results Extraction: A complete and detailed reading from these studies allowed us to orga-
nize and classify then for a later analysis. With an unbiased evaluation of the information, identified and
classified studies records were generated in a structured table containing the following rows: Consecutive Study
(sequential paper number), Study methodology (remarks of the main ideas con-cerned with the methodology),
and Study outcome (data and information of the conclusion presented in each study).
Subjective Result Extraction: The following rows where added to the previous table: Data about
Authors (full names and available contact information in the studies) and Additional Notes (a specific field to
store general information related to subject covered in the study).
re correction process
4.4.4 Resolution of divergences between reviewers
In the development procedure for the extraction of the information contained in the selected primary
studies, different perceptions among authors of the studies were presented. However, none of them is considered
as an important divergence, but rather, the findings were complemented to obtain a com-prehensive analysis of
the paper.
V. Result Summary
After the systematic review execution, the results must be summarized and analyzed using the statis-
tical methods defined during the planning phase. This section presents a summary of the data resul-ting from the
selected studies. This summary is obtained from statistical calculus.
5.1 Studies Trends
In order to know organization trend respect to Service Level Management (SLM), studies related to any
aspect of SLM were classified, taking into account that "SLM" term refers to both Service Level Agreement
(SLA) and Service Level Operation (SLO) terms.
Figure 1 shows two types of trends. 1) Between 2002 and 2006, there is a polynomial trend of order 3
because data fluctuate along the graphic. And, B) from 2006 to 2008 data have a linear trend because the studies
are increasing at a constant rate. The trend shows from year 2006 the increasing interest related to Service Level
Management.
Fig. 1. Studies Trend
6. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 99 | Page
5.2 Studies Classification
During the protocol development, and using the studies selection’s methodology and information an-
alysis found in each study, it was possible to determine that studies could be classified into four items. Those
studies covering:
A) topics related only to ITSM and SLM.
B) topics related only to ITSM and small settings.
C) a relationship of three topics (ITSM and SLM and small settings), and
D) other studies that have no relationship with these issues (ITSM and SLM and small settings). on I:
Management of the failure correction proc
Figure 2 shows the studies percentage for each item according to the previous classification.
Fig. 2. Studies Classification
Figure 2 shows that the 45% of the primary studies (see Table 5) are related to ITSM and SLM what
confirms the trend shown in Figure 1. The 26% shows information related to ITSM and small settings.
However, it is necessary to highlight that only 23% is related to item C) that grouped the three topics (ITSM,
SLM and small settings). Finally a 6% has been eliminated by the exclusion criteria EC1inf.
5.3 Analysis of those studies covering the relationship of three topics (ITSM, SLM and small settings)
Figure 3 shows the results of relationship related to topics (ITSM, SLM and small settings). In the an-
alysis, it is noted that 23% of the papers comprise three aspects (basis of the ongoing systematic re-view). From
here all analyses are referred to this 23% (item C).
5.3.1 Analysis by country
The source of 23% of the papers is shown in Figure 3. United States of America is one of the main
countries involved in the study of ITSM, SLM and small settings, with 29%. The remaining studies are divided
in the countries South Korea, Sweden, French, Canada and Germany with 14% respectively.
Fig. 3. Studies Classified by country
7. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 100 | Page
5.3.2 Analysis by company size
Figure 4 shows information about companies’ size. Due to most of the studies are short of information
about companies, Figure 4 has been made taking into account two criterions: 1) the application of studies in the
companies’ size, 2) the studies did not mention the companies’ size. Hence, according to Figure 4, most of the
companies that support their research are small companies, 85,7%. Remaining 14,3% companies are not
mentioned.
Fig. 4. Studies by companies size
5.3.3 Analysis by models
With respect to item C only the 78% have used ITIL. COBIT and ISO 20000.
Fig. 5. Studies Classified by models
VI. Conclusions
This work shows the results for Systematic Review of the studies related to Service Level Manage-
ment in small settings. It was obtained using the protocol proposed by Biolchini et al [10] The obtained results
show the status of the art for “Service Level Management in small settings”. We can see most of the works have
been performed in year 2008. According to the statistics we find from year 2005 the works on Service Level
Management are increasing significantly. This trend confirms the interest over SLM process showed by Gartner
and CMMI-SVC reports.
Other relevant data showed in this work is that 45 % of studies papers deal with IT service manage-
ment in terms of SLM (include SLA and SLO). The 26% of the studies is related to small setting (in- clude
SMEs). Moreover, 23 % of studies are related to SLM and small settings. The studies show that ITIL, COBIT,
and ISO2000 are the most important models in a Service Level management context. These results can help
users who are working with SLM or can help to know current initiatives in this domain.
8. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 101 | Page
Acknowledgments
This work is sponsored by Endesa, everis Foundation through the Research Group of Software Pro-cess
Improvement for Spain and Latin American Region, as well as by the Secretariat of Public Edu-cation (Mexico)
with a scholarship PROMEP through the agreement with the Autonomous University of Tamaulipas.
Appendix A: List of primary studies in the systematic review
Next are presented the selected primary studies in the development of this systematic review.
References
[1]. NeilMcBride, “Exploring service issues within the IT organization: Four mini-case studies”, International Journal of Information
Management, 2009
[2]. Stefan Thanheiser, Lei Liu, HartmutSchmeck: “Sim-SOA: an approach for agent-based simulation and design-
time assessment of SOC-based IT systems”, Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu,
Hawaii, USA, March 9-12, 2009
[3]. CMMI Product Team, “CMMI® for Services, Version 1.2”, Technical Report CMU/SEI-2009-TR-001, Software Engineering
Institute, USA, March, 2009
[4]. Mira Kajko-Mattsson and Christos Makridis, “Evaluating SLA Management Process Model within Four Companies”, The Third
International Conference on Software Enginee-ring Advances, Sliema, Malta, 2008
[5]. Thomas Schaaf, Michael Brenner, “On Tool Support for Service Level Management: From Requirements to Sy-
stem Specifications”, Proceedings of BDIM 2008, 3rd IEEE/IFIP International Workshop on Business-Driven IT Management, ,
Salvador, Brazil. IEEE 2008
[6]. GenadyGrabarnik, Heiko Ludwig, Larisa Shwartz, “Dynamic Management of Outsourced Service Processes’ QoS in a Service
Provider – Service Supplier Environ-ment”, International Workshop on Business-Driven IT Management, BDIM 2008: Salvador,
Brazil, 2008
[7]. Adrian Paschke, Martin Bichler, “Knowledge represen-tation concepts for automated SLA management”, The Computing Research
Repository (CoRR), Decision Sup-port Systems 46 (2008) 187–205, 2008
[8]. Jung-Oh Park, Sang-Geun Kim, Byeong-Hun Choi, Moon-Seog Jun, “The study on the maturity measurement method of security
management for ITSM”, International Conference on Convergence and Hybrid Information Technology, Gyeongbuk, S. Korea,
2008
[9]. Rajeev Gupta, K Hima Prasad, MukeshMohania, “Automating ITSM Incident Management Process”, Inter-national Conference on
Automonic Computing, Chicago, IL, USA , 2008.
[10]. HainingWang Shouqian Sun Yanan Huang Shiwei Cheng, “An ITIL-Based IT Service Management Model for Garment
Enterprises”, International Conference on Infor-mation Management, Innovation Management and Indus-trial Engineering, 2008.
ICIII '08, Taipei, Taiwan, 2008
[11]. Nabiollahi, Akbar bin Sahibuddin, Shamsul , “Consi-dering service strategy in ITIL V3 as a framework for IT Governance,
International Symposium on Information Technology”, ITSim 2008, 26-28 Aug. Kuala Lumpur, Malaysia, 2008
[12]. Jin, K. Ray, P. “Business-Oriented Development Methodology for IT Service Management”, Proceedings of the 41st Annual
Hawaii International Conference on Sy-stem Sciences, Hawaii, USA, 2008
[13]. Philip Bianco, Grace A. Lewis, Paulo Merson, “Service Level Agreements in Service-Oriented Architecture Envi-ronments”,
Technical Note CMU/SEI-2008-TN-021, Soft-ware Engineering Institute, 2008
[14]. Michael Brenner, Gabi DreoRodosek, et al, “Provisio-ning: Challenges, Process Alignment and Tool Support”. Handbook of
Network and System Administration, 2008, Pages 855-904
[15]. Larisa Shwartz, Naga Ayachitula et al, IT Service Provider’s Multi-Customer and Multi-Tenant Environments, The 9th IEEE
International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-
Commerce and E-Services(CEC-EEE 2007), Tokyo, Japan,2007
[16]. Christian Braun, Robert Winter, “Integration of IT service management into enterprise architecture”, Sympo-sium on Applied
Computing archive, Proceedings of the 2007 ACM symposium on Applied computing table of contents, Seoul, Korea, 2007
[17]. International Conference on Wireless Com-munications, Networking and Mobile Computing, WiCom 2007, Shanghai, China, 2007
[18]. Larisa Shwartz, Naga Ayachitula, Melissa Buco, MaheswaranSurendra, Christopher Ward, “Service Pro-vider Considerations for IT
Service Management”, 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25
May 2007
[19]. Rob Addy, “Effective IT Service Management”, ISBN 978-3-540-73197-9 Springer Berlin Heidelberg New York, 2007
[20]. Halina Kaminski, Mark Perry, “Employing Intelligent Agents to Automate SLA Creation”, Whitestein Series in Software Agent
Technologies and Autonomic Computing Book Emerging Web Services Technology, 2007
[21]. Brenner M., DreoRodosek G., Hanemann A., Heger-ing H.-G., König R. “Service Provisioning: Challenges, Process Alignment and
Tool Support”. Handbook of Net-work and System Administration, J. Bergstra, M.Burgess (editors) Elsevier, 2007, ISBN 978-0-
444-52198-9.
[22]. Hao Wang Bo Yang Liang Liu Qian Ma Ke Wei Sun Ying Chen , “Knowledge Enhanced IT Service Man-agement”, IEEE
International Conference on e-Business Engineering, ICEBE 2007, Hong Kong, 2007.
[23]. Sven Graupner, Nigel Cook, Derek Coleman, TiloNitzsche, “Platform for Delivering IT Management Ser-vices”, Hewlett-Packard
Laboratories, 1501 Page Mill Road, Palo Alto, CA 94304, USA, 2006
[24]. Software Engineering Institute, “Improving Processes in Small Settings (IPSS) A White Paper”, The International Process Research
Consortium (IPRC) Pittsburgh, PA 15213, 2006
[25]. Michael Brenner , “Classifying ITIL Processes: A Taxonomy under Tool Support Aspects”, IEEE/IFIP Inter-national Workshop on
Business-Driven IT Management (BDIM 2006) Vancouver, Canada, April 7, 2006
[26]. Rodrigo Bonfá Drago, Rodolfo da Silva Villaça, “A Proposed Web Tool for IT Environment Service Manage-ment”, Proceedings
of the Advanced International Confer-ence on Telecommunications and International Confer-ence on Internet and Web
Applications and Services (AICT/ICIW 2006), Guadeloupe, French Caribbean, 2006
[27]. AkhilSahai and Sven Graupner, “Enterprise Man-agement and Web Services,Web Services in the Enter-prise”, Springer US ISBN
978-0-387-23374-1 (Print) 978-0-387-27597-0 (Online), 2005
[28]. Thorsten Anders, “Development of a generic IT ser-vice catalog as pre-arrangement for Service Level Agree-ments”, 10th IEEE
Conference on Emerging Technologies and Factory Automation, 2005. ETFA, Catania, Italy, 2005.
9. Service Level Management For it Ser-Vices in Small Settings: A Systematic Review
DOI: 10.9790/0661-18030594102 www.iosrjournals.org 102 | Page
[29]. Jos J.M. Trienekens, Jacques J. Bouman, Mark van der Zwan, “Specification of Service Level Agreements: Problems”, Principles
and Practices, Software Quality Journal, Volume 12, Number 1 / March, 2004, Springer Netherlands.
[30]. [30] Claudio Bartolini and Mathias Sallé, “Business Driven Prioritization of Service Incidents”, 15th IFIP/IEEE Interna-tional
Workshop on Distributed Systems: Operations and Management, DSOM 2004, Davis, CA, USA, DSOM 2004, LNCS 3278, pp.
64–75, 2004.
[31]. V.P. Wade, “Service management and the telecom-munications information networking”, Computer Communi-cations 22 (1999)
1633–1637, Elsevier Science B.V. Dub-lin, Ireland.
Literature
[32]. National Academy of Engineering. The impact of Academic Research on Industrial Performance. The National Aca-demic Press,
Washington, DC, 2003.
[33]. [2] Eileen Forrester, CMMI for Service (CMMI-SVC) Overview, Software Engineering Institute, Carnegie Mellon Univer-sity,
USA , 2006
[34]. Lynch, C. G. “Most Companies Adopting ITIL® Practices,” CIO Magazine, March 1, 2006.
[35]. Stuart, G., Ronald, D., Jim, J.Q, Sue C, Information Technology Service Management-An Emerging Area for Academic Research
and Pedagogical Development, SIGMIS-CPR’07, St.Louis, Missouri, USA, 2007
[36]. Office of Government Commerce, ITIL: Service Design, The Stationary Office. 2007
[37]. Office of Government Commerce,The official introduction to the ITIL service lifecycle: the official introduction to the ITIL service
lifecycle, The Stationary Office, 2007
[38]. Hochstein, A., Zarnekow, R., Brenner, W.: ITIL as Common Practice Reference Model for IT Service Management – Formal
assessment and implications for practice, in: Proceedings of the 2005 IEEE International Conference on E- Tech-nology, E-
Commerce and E-Service, Hong Kong, 2005.
[39]. Directorio Central de Empresa DIRCE, Empresasespañolas (estrato de asalariados y porcentajedel total) DIRCE 2007.
http://www.ine.es/inebase/cgi/axi
[40]. http://www.interpromusa.com/downloads/Book%20Content/Introduction%20to%20ITIL.pdf, February 4, 2009
[41]. BiolchiniJ.,Gomes M.P., Cruz N.A., Horta T.G., “Systematic Review in Software Engineering”, RT ES679/05, 2005
[42]. Kitchenham, B. A., Dyba, T. and Jorgensen, M., Evidence-based Software Engineering, 26th International Conference on Software
Engineering (ICSE 2004), Scotland, 2004.
[43]. Pino J.F., G.F., Piattini M., Software process improvement in samll and medium software enterprises: a systematicreview. Softwaer
Quality Springer, 2008.16(2): p. 237-261.
[44]. ISO/IEC-20000-1 (2005). Information Technology- Service Management-part 1:Specification, International Standard Organization.
[45]. DIRCE, D.C.d.E. Empresasespañolas (estrato de asalariados y porcentajedel total) DIRCE 2007.
[46]. Johnston, R.B.a.R., Service Agreements- A management Guide. first ed. ITSM Library, ed. J.V.B.a.A.d. Jong. 2006: Van Haren
Publishing.
[47]. AEC (2007), “La consultoríaenEspaña”, Asociación Española de Empresas de Consultoría. El sector encifras 2007
engineering and software process improvement.