Systematic literature review for the development of a conceptual model on the relationship between knowledge sharing, information technology infrastructure and innovative capability

2020 ◽  
Vol 32 (7) ◽  
pp. 801-821
Author(s):  
Adalberto Ramos Cassia ◽  
Ivanir Costa ◽  
Victor Hugo Carlquist da Silva ◽  
Geraldo Cardoso de Oliveira Neto
2019 ◽  
Vol 10 (1) ◽  
pp. 34 ◽  
Author(s):  
Juan Luis Rubio ◽  
Magdalena Arcilla

One of the main points when implementing the Information Technology Infrastructure Library (ITIL) is which order the processes must be implemented. In the systematic literature review (SLR) developed, it is possible to find references about strategies and factors that ease the implementation of the ITIL, static sequences for the processes to be implemented, and recommendations about the first process to implement, but it is rather complicated to find references that explicitly define the order (adapted to a specific company) of the processes to be implemented. Thus, once it is shown that there is no methodology/algorithm providing a sequence of ITIL processes specifically adapted for each company, an algorithm to solve this problem is presented: The algorithm has a deep mathematical basis and returns a sequence of ITIL processes to optimize the efforts during implementation, so the company implementing the ITIL gets the closest to the competitors. The optimization is made considering parameters such as staff, age of the company, IT size, industry, etc. Thus, the sequence proposed is specific for each company. Finally, a comparative of the sequence obtained (from the proposed algorithm) with sequences discovered in the SLR is presented and applied to a real case.


The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading organizations are providing for security and auditing professionals to follow. The chapter reviews relevant features for auditing approaches in the following order: ISO/IEC 27001:2013, ISO/IEC 27002:2013, Control Objectives for Information and Related Technology (COBIT) 2019, Information Technology Infrastructure Library (ITIL) 4, AICPA, ISACA, NIST SP 800-53, NIST CSF v1.1, IIA, PCI DSS, ITAF, COSO, ENISA, NERC CIP, and CSAM.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Munir de Sá Mussa ◽  
Renata Gomes Cordeiro ◽  
Henrique Da Hora

Purpose An area of information technology (IT) in organizations is required to manage resources efficiently. For this, IT certifications are adopted by companies and sought by professionals. However, these have many requirements and to identify which are paramount to the performance of their activities and/or are much more important to IT managers is not a trivial task. The purpose of this study is to identify how the processes of the Information Technology Infrastructure Library (ITIL) v3 and Control Objectives for Information and Related Technology (CobiT) 5 certifications are analyzed by IT managers. Regarding the knowledge of professionals about the processes, which are more important, less important or indifferent in the manager’s view. Design/methodology/approach A survey is carried out with IT managers using questions elaborated according to the Kano model in which the processes of the analyzed certifications are related to classify according to the proposed model. Findings Of the 64 analyzed processes, 20 CobiT processes and 13 ITIL processes were classified as must-be requirements. Another 17 CobiT processes and 9 ITIL processes were classified as one-dimensional and 5 ITIL processes are present in more than one relationship with CobiT processes and, depending on the relationship, they were classified as must-be or one-dimensional requirements. Originality/value It is concluded that this study contributes in the discussion of the importance of the ITIL and CobiT implementations and analyzes the relevance of ITIL and CobiT certification processes in the view of IT managers, providing useful information for the professionals in terms of prioritization of the processes expected by the managers.


2019 ◽  
Vol 33 (4) ◽  
pp. 703-728 ◽  
Author(s):  
Carl Kühl ◽  
Michael Bourlakis ◽  
Emel Aktas ◽  
Heather Skipworth

Purpose The purpose of this paper is to test the link between servitisation and circular economy by synthesising the effect of product-service systems (PSS) on supply chain circularity (SCC). Design/methodology/approach Following a systematic literature review methodology, the study identified 67 studies and synthesised them using content analysis. Findings A conceptual model is developed illustrating how PSS business models impact SCC through increased product longevity, closure of resource loops and resource efficiency. It also identifies six contextual factors affecting the implementation of SCC including: economic attractiveness of SCC; firm sustainability strategy; policy and societal environment; product category; supply chain relationships; and technology. Research limitations/implications The conceptual model proposes that SCC increases with servitisation. It also proposes that the main circularity effect stems from increased product longevity, followed by closed resource loops and finally resource efficiency. The model is deduced from the literature by using secondary data. Practical implications The review provides practitioners with a framework to increase SCC through PSS business models. It also gives insight into the various contextual factors that may affect how a manufacturer’s servitisation strategy contributes to SCC. Originality/value This review contributes to the understanding of the relationship between servitisation and SCC by synthesising the different effects that exist. Moreover, it creates new knowledge by identifying a range of contextual factors affecting the relationship between PSS and SCC.


2018 ◽  
Vol 5 (5) ◽  
pp. 517
Author(s):  
Nina Fadilah Najwa ◽  
Tony Dwi Susanto

<p>Perkembangan transisi Teknologi Informasi (TI) saat ini menyebabkan penelitian terkait dengan tata kelola TI semakin meningkat.Tata kelola TI berperan besar dalam sebuah organisasi karena telah berubahnya peran dan relevansi TI dalam organisasi sehingga diperlukan pemahaman yang jelas terkait dengan tata kelola TI saat ini.Tujuan penulisan ulasanliteratur ini yaitu untuk mengulas perkembangan topik Tata Kelola dan peluang penelitian lebih lanjutterkait tata kelola TI sehingga dapat memberikan pemahaman tentang tata kelola TI. Metodologi yang digunakan pada ulasan literatur ini mencakup: 1) pendefinisian pertanyaan penelitian; 2) penetapan sumber literatur; 3) penentuan kata kunci pencarian literatur; 4) Pemilihan literatur; dan 5) ekstraksi data dan sintesis.Berdasarkan hasil ulasan literatur yang dilakukan, penelitian tata kelola TI secara luas diterapkan pada organisasi bisnis.Terdapat beberapa metode dan kombinasi dari beberapa metode yang digunakan dalam tata kelola TI, mencakup <em>Control Objectives for Information and Related Technologies</em> (COBIT), <em>Information Technology Infrastructure Library</em> (ITIL), <em>Information Technology Balanced Scorecard</em> (IT-BSC), dan metode-metode lain. Tren penelitianyang saat ini banyak dilakukan mencakup <em>cloud computing governance, criteria success factor IT governance,</em> penerapan dan atau evaluasi tata kelola dengan berbagai metode pada sektor bisnis, tata kelola TI pada universitas, peran tata kelola dalam pemerintahan dan rumah sakit. Peluang penelitian direkomendasikan berdasarkan <em>future</em> dan limitasi dari masing-masing <em>paper</em> yang dibahas.</p><p> </p><p><strong><em>Abstract</em></strong></p><p><em><em>The development of the current Information Technology (IT) transition has led to more research on IT governance. IT governance plays a major role in an organization because it has changed the role and relevance of IT in the organization so that a clear understanding of current IT governance is needed. The purpose of this literature review is to review the development of Governance topics and further research opportunities related to IT governance so as to provide an understanding of IT governance. The methodology used in this literature review includes: 1) defining research questions; 2) determination of literature sources; 3) the determination of literature search keywords; 4) Selection of literature; and 5) data extraction and synthesis. Based on the results of the literature review conducted, IT governance research is widely applied to business organizations. There are several methods and combinations of several methods used in IT governance, including Control Objectives for Information and Related Technologies (COBIT), Information Technology Infrastructure Library (ITIL), Information Technology Balanced Scorecard (IT-BSC), and other methods . Current research trends include cloud computing governance, IT governance success factor criteria, governance implementation and or evaluation with various methods in the business sector, IT governance at universities, governance roles in government and hospitals. Research opportunities are recommended based on the future and limitations of each paper discussed.</em></em></p>


2022 ◽  
pp. 1-18
Author(s):  
Regner Sabillon

The objective of this chapter is to provision a comprehensive literature review of the most relevant approaches for conducting cybersecurity audits. The study includes auditing perspectives for specific scopes and the best practices that many leading organizations are providing for security and auditing professionals to follow. The chapter reviews relevant features for auditing approaches in the following order: ISO/IEC 27001:2013, ISO/IEC 27002:2013, Control Objectives for Information and Related Technology (COBIT) 2019, Information Technology Infrastructure Library (ITIL) 4, AICPA, ISACA, NIST SP 800-53, NIST CSF v1.1, IIA, PCI DSS, ITAF, COSO, ENISA, NERC CIP, and CSAM.


Author(s):  
Livio Cricelli ◽  
Michele Grimaldi ◽  
Silvia Vermicelli

AbstractIn recent years, Open Innovation (OI) and crowdsourcing have been very popular topics in the innovation management literature, attracting significant interest and attention, and inspiring a rich production of publications. Although these two topics share common themes and address similar managerial challenges, to the best of our knowledge, there is no systematic literature review that digs deep into the intersection of both fields. To fill in this gap a joint review of crowdsourcing and OI topics is both timely and of interest. Therefore, the main objective of this study is to carry out a comprehensive, systematic, and objective review of academic research to help shed light on the relationship between OI and crowdsourcing. For this purpose, we reviewed the literature published on these two topics between 2008 and 2019, applying two bibliometric techniques, co-citation and co-word analysis. We obtained the following results: (i) we provide a qualitative analysis of the emerging and trending themes, (ii) we discuss a characterization of the intersection between OI and crowdsourcing, identifying four dimensions (strategic, managerial, behavioral, and technological), (iii) we present a schematic reconceptualization of the thematic clusters, proposing an integrated view. We conclude by suggesting promising opportunities for future research.


Sign in / Sign up

Export Citation Format

Share Document