Search results

11 – 20 of over 252000
Article
Publication date: 29 March 2013

Staffan Furusten

The purpose of this paper is to explore and construct a model for the mechanisms for authorization of actors in contemporary society performing in the role of the expert.

2770

Abstract

Purpose

The purpose of this paper is to explore and construct a model for the mechanisms for authorization of actors in contemporary society performing in the role of the expert.

Design/methodology/approach

The study used qualitative analyses of about 70 interviews with management consultants in small/middle‐sized nationally based (in Sweden) consultancies, and with buyers in public organizations of their services. The data are, however, expected to represent more general tendencies of the mechanisms for authorization of experts such as management consultants. The interviews were seen as narratives from the field and interpreted qualitatively in order to search for patterns and categories.

Findings

Systems for professionalism in practice among experts such as management consultants do not follow the routes suggested by traditional theories of professions. It is another system for professionalism where success in commercialisation means authorization in the role of the expert on the market. The mechanism for authorization is trust and the way to construct this is that the single expert and the organizations he or she represents emphasize versatility, availability, relevance and differentiation in their practice as experts.

Research limitations/implications

There is a growth in numbers, competence areas and importance of these forms of expert work in contemporary society. Understanding this is necessary and this study offers a model that explains this.

Practical implications

Markets for vague forms of experts, such as management consultants, are emerging. These are challenges faced by many individuals and organizations today.

Social implications

More individuals work under consulting conditions, more organizations tend to hire more external experts of various kinds on temporary bases instead of employing them, and the number of expert organizations is emerging and their size is increasing.

Originality/value

Little attention has been devoted to explanations of how authorization in practice is constructed and achieved among the new experts. This study offers a model for how this can be understood.

Details

Journal of Organizational Change Management, vol. 26 no. 2
Type: Research Article
ISSN: 0953-4814

Keywords

Article
Publication date: 9 July 2021

Dayu Wang, Daojun Zhong and Liang Li

Information technology infrastructure library (ITIL) is a commonly utilized IT service management execution technique that helps IT services to be planned, designed, selected…

1210

Abstract

Purpose

Information technology infrastructure library (ITIL) is a commonly utilized IT service management execution technique that helps IT services to be planned, designed, selected, operated and continuously improved. ITIL procedures are utilized to measure the efficiency of IT service management procedures and their association with the accelerated system development of cloud systems. The challenges faced in IT deployment and maintenance management significantly restrict cloud computing services' reliability. Therefore, this article aims to review a comprehensive study of the role of cloud computing on the ITIL processes.

Design/methodology/approach

Each enterprise strives to stay competitive in the market and offers the services its consumers are looking for, all in line with cost-effectiveness and client needs. The ITIL framework provides best practice guidance for IT service management that includes a collection of ample publications supplying detailed guidelines on the management of IT functions, processes, responsibilities and roles associated with IT service management. On the other hand, the way companies employ IT services with an effect on the role of enterprise infrastructure is altered by cloud computing. Hence, the investigation makes utilization of a systematic literature review (SLR) detailing crucial success factors of cloud computing execution in ITIL. The authors have recognized 35 valuable contributions, providing a comprehensive view of study in this field, of which 22 papers were found according to some filters that have been analyzed in this article. Selected articles are presented in two groups, including cloud service and cloud service providers.

Findings

Owing to the overall expense of execution and problems with combining the ITIL approach with the existing organizational IT strategic strategy, ITIL adoption has begun to wane over the last few years. An established methodology for ITIL deployment that will assure long-term success for those wanting to use private cloud procurement will be the most important inference that can be taken from this article. ITIL offers a perfect platform to execute and support cloud applications effectively. IT will prevent cloud sprawl and instability, reduce the likelihood of service interruption and optimize customer loyalty by merging humans, procedures and technologies into hybrid environments.

Research limitations/implications

This survey is more aimed at specialists such as IT experts; so, further evaluations must also be carried out in order to understand the company's views on the risks and advantages of adopting ITIL. In addition, non-English articles are not discussed in this article.

Practical implications

The study outcomes would help suppliers of cloud computing services assess their service quality and ensure customer satisfaction with the quality of cloud computing services. The outcomes will also supply a reference for cloud infrastructure customers to assess and choose various kinds of cloud computing services.

Originality/value

An SLR with perspectives from ITIL professionals and business studies is the benefit of this report. By offering a more thorough framework that helps companies achieve efficiency, effectiveness and creativity in ITIL execution, this article would be useful for ITIL clients, decision-makers and developers.

Details

Library Hi Tech, vol. 40 no. 6
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 16 August 2011

Jayachandra Bairi, B. Murali Manohar and Kumar Kundu

The purpose of this paper is to develop and evaluate a good knowledge management (KM) framework for IT services companies to provide an integrated approach to IT services for

1106

Abstract

Purpose

The purpose of this paper is to develop and evaluate a good knowledge management (KM) framework for IT services companies to provide an integrated approach to IT services for efficient knowledge management.

Design/methodology/approach

The framework is evaluated at three Indian IT organizations providing global IT services with successful KM programs dedicated to services. Expert interviews were conducted with senior management involved in the KM programs. Information collected was used for studying the KM framework implemented by each organization for services and then content analyzed and evaluated.

Findings

The paper provides evidence of various strategic, technological critical factors influencing the success of KM programs in IT services companies. Organizations with successful KM programs typically adapt attrition control measures, rewards and recognitions. Application of key enabler tools of KM help in robust knowledge management, reducing cost to client, helping companies to excel better.

Research limitations/implications

Interviews are limited to three large companies in the Bangalore region. Future in‐depth studies across regions, with a mix of medium/large organizations would benefit from a larger and more diverse sample.

Practical implications

It is suggested that IT services organizations develop specific capabilities to create knowledge management system (KMS) for productivity benefits and increased profitability. To provide clear benchmarks for developing these capabilities, mainly from the outsourcing point of view, a KM framework for IT services is provided.

Originality/value

Integrated KMS is discussed from a unique perspective of IT services by integrating knowledge management and IT services. The paper also reviews customers' expectations from IT service providers. The paper conducts preliminary evaluation of the KM framework for IT services and provides a broader view for future research opportunities.

Abstract

Details

Delivering ITSM for Business Maturity: A Practical Framework
Type: Book
ISBN: 978-1-78973-251-1

Abstract

Details

Delivering ITSM for Business Maturity: A Practical Framework
Type: Book
ISBN: 978-1-78973-251-1

Book part
Publication date: 31 December 2010

The following is an introductory profile of the fastest growing firms over the three-year period of the study listed by corporate reputation ranking order. The business activities…

Abstract

The following is an introductory profile of the fastest growing firms over the three-year period of the study listed by corporate reputation ranking order. The business activities in which the firms are engaged are outlined to provide background information for the reader.

Details

Reputation Building, Website Disclosure and the Case of Intellectual Capital
Type: Book
ISBN: 978-0-85724-506-9

Article
Publication date: 1 December 1996

Rocco R. Vanasco

Examines the role of professional associations, governmental agencies, and international accounting and auditing bodies in promulgating standards to foster auditor independence…

11151

Abstract

Examines the role of professional associations, governmental agencies, and international accounting and auditing bodies in promulgating standards to foster auditor independence domestically and abroad. Focuses specifically on the role played by the American Institute of Certified Public Accountants, the Institute of Internal Auditors (IIA), the Securities and Exchange Commission and the US Government Accounting Office. Also looks at other professional associations in banking, industry, and manufacturing sectors dealing with sensitive issues of auditors′ involvement in such matters as management advisory services, operating responsibilities, outsourcing, opinion shopping, auditor rotation, and other conflicts of interest which may impair auditor independence.

Details

Managerial Auditing Journal, vol. 11 no. 9
Type: Research Article
ISSN: 0268-6902

Keywords

Article
Publication date: 15 November 2018

Lauri Lepistö, Justyna Dobroszek, Sinikka Moilanen and Ewelina Zarzycka

The purpose of this paper is to improve understanding of the work of management accountants in the context of a shared services centre.

1083

Abstract

Purpose

The purpose of this paper is to improve understanding of the work of management accountants in the context of a shared services centre.

Design/methodology/approach

A single case study method is used and data are collected via semi-structured interviews and internal documents. The empirical materials are analysed from the theoretical perspective of dirty work, incorporating aspects from practice theory.

Findings

Findings suggest that management accountants working in a shared services centre develop their occupational esteem by refocusing and reframing strategies. Through these strategies, management accountants can decrease the perceived “dirtiness” associated with their work.

Originality/value

The study sheds light on the under-researched topic of management accountants’ work within a shared services centre. Moreover, it offers the metaphor of liminal work to characterise how management accountants develop their occupational esteem in circumstances where gaining efficiency is the main objective.

Details

Journal of Accounting & Organizational Change, vol. 14 no. 4
Type: Research Article
ISSN: 1832-5912

Keywords

Book part
Publication date: 4 December 2020

Abdelkebir Sahid, Yassine Maleh and Mustapha Belaissaoui

This chapter presents an analysis illustrating the evolution of information systems’ development based on three interdependent phases. In the first period, information systems…

Abstract

This chapter presents an analysis illustrating the evolution of information systems’ development based on three interdependent phases. In the first period, information systems were mainly considered as a strictly technical discipline. Information technology (IT) was used to automate manual processes; each application was treated as a separate entity with the overall objective of leveraging IT to increase productivity and efficiency, primarily in an organizational context. Secondly, the introduction of networking capabilities and personal computers (instead of fictitious terminals) has laid the foundations for a new and broader use of information technologies while paving the way for a transition from technology to its actual use. During the second phase, typical applications were intended to support professional work, while many systems became highly integrated. The most significant change introduced during the third era was the World Wide Web, which transcended the boundaries of the Internet and the conventional limits of IT use. Since then, applications have become an integral part of business strategies while creating new opportunities for alliances and collaborations. Across organizational and national boundaries, this step saw a transformation of IT in the background. These new ready-to-use applications are designed to help end-users in their daily activities. The end-user experience has become an essential design factor.

Details

Strategic Information System Agility: From Theory to Practices
Type: Book
ISBN: 978-1-80043-811-8

Article
Publication date: 15 June 2010

Ming‐Kuen Chen and Shih‐Ching Wang

Over the past decade, many small‐ and medium‐sized enterprises have incurred dramatic losses due to major disasters, causing loss of their business information systems and…

1559

Abstract

Purpose

Over the past decade, many small‐ and medium‐sized enterprises have incurred dramatic losses due to major disasters, causing loss of their business information systems and transaction data, so, they have started to outsource their information operations to data centers (DCs), in order to monitor critical business data operations. The purpose of this paper is to propose a dual‐sided business data integrity policy framework.

Design/methodology/approach

Based on a review of the available literature, case studies, and in‐depth interviews with top CEOs and experts in the field, a fuzzy Delphi method is proposed in two frameworks. In addition, a risk evaluation rule is derived by applying Bayesian decision analysis to mitigate the risk and lower the cost in their outsourcing policy; and Delphi method is used to extract 11 DC service quality evaluation indicators and also use these indicators to conduct a benchmark in Taiwan. Furthermore, the proposed framework is applied to figure out critical service advantages as well as suggestions for the DC involved in the benchmark.

Findings

The results of framework point out that enterprises should monitor the four operation elements (facility and infrastructure, server system management, information security management, and disaster recovery (DR) mechanism) to ensure and improve their data integrity; and DC firms need to build robust facilities and services in the five operation elements (customizability, serviceability, information technology infrastructure, security management, and knowledge intensity).

Originality/value

This paper uses a hybrid Delphi‐Bayesian method to propose a new framework, which is adequately integrated with the consensus of experts and business decision makers; higher professionalism and content validity are achieved. Enterprises can use these indicators to evaluate the service quality of DCs among DC firms.

Details

Kybernetes, vol. 39 no. 5
Type: Research Article
ISSN: 0368-492X

Keywords

11 – 20 of over 252000