Attributes of IT certifications aligned to organizations’ needs

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Munir de Sá Mussa ◽  
Renata Gomes Cordeiro ◽  
Henrique Da Hora

Purpose An area of information technology (IT) in organizations is required to manage resources efficiently. For this, IT certifications are adopted by companies and sought by professionals. However, these have many requirements and to identify which are paramount to the performance of their activities and/or are much more important to IT managers is not a trivial task. The purpose of this study is to identify how the processes of the Information Technology Infrastructure Library (ITIL) v3 and Control Objectives for Information and Related Technology (CobiT) 5 certifications are analyzed by IT managers. Regarding the knowledge of professionals about the processes, which are more important, less important or indifferent in the manager’s view. Design/methodology/approach A survey is carried out with IT managers using questions elaborated according to the Kano model in which the processes of the analyzed certifications are related to classify according to the proposed model. Findings Of the 64 analyzed processes, 20 CobiT processes and 13 ITIL processes were classified as must-be requirements. Another 17 CobiT processes and 9 ITIL processes were classified as one-dimensional and 5 ITIL processes are present in more than one relationship with CobiT processes and, depending on the relationship, they were classified as must-be or one-dimensional requirements. Originality/value It is concluded that this study contributes in the discussion of the importance of the ITIL and CobiT implementations and analyzes the relevance of ITIL and CobiT certification processes in the view of IT managers, providing useful information for the professionals in terms of prioritization of the processes expected by the managers.

2019 ◽  
Vol 32 (1) ◽  
pp. 78-91
Author(s):  
Hossein Vaez Shahrestani ◽  
Arash Shahin ◽  
Hadi Teimouri ◽  
Ali Shaemi Barzoki

Purpose The purpose of this paper is twofold: first, to revise the Kano model with a focus on one-dimensional attributes; and second, to use the revised model for categorizing and prioritizing various employee compensation strategies. Design/methodology/approach The Kano evaluation table has been revised and the one-dimensional attribute has been further extended to three categories of OO, OM and OA. In the next step, the literature review-based identified strategies have been categorized and prioritized according to the developed Kano model. Consequently, an employee compensation system has been proposed to a process-based manufacturing company as a case study. Findings Findings indicated that out of the 44 employee compensation strategies, typically 6 were must-be, 13 were one-dimensional, 18 were attractive and 7 were indifferent. Also, the results of the revised Kano model indicated that typically out of the 13 one-dimensional strategies, 7 were one-dimensional tending toward must-be (OM); and 6 were one-dimensional tending toward attractive (OA). Research limitations/implications The case study was limited to one company. The validity of the proposed model can be further studied in a larger population. This study provides managers with a more accurate instrument of decision making in selecting more differentiated employee compensation strategies, which, in turn, might lead to more employee satisfaction. Originality/value Theoretically, this study is different from existing studies, since almost none of the previous studies extended the Kano evaluation table for one-dimensional attributes. Practically, this study is another evidence of the application of the Kano model in the field of human resource management and in particular contributes to the design of employee compensation systems.


Author(s):  
J. Lane Thames ◽  
Andrew Hyder ◽  
Robert Wellman ◽  
Dirk Schaefer

With the proliferation of distributed and distance learning in higher education, there is a growing need for remote and portable laboratory design and deployment for the engineering, science, and technology education sectors. Amongst the current threads of research in this area, very little work has focused on solutions to the challenges, which are imposed by modern day information technology infrastructure, enterprise networks, and enterprise network security change management processes, that will be faced by large scale deployments of remote and portable labs. In this paper, the authors will discuss some of these challenges and will propose the use of the command and control communications architecture coupled with Web 2.0 as a solution to many of the deployment challenges.


2018 ◽  
Vol 118 (9) ◽  
pp. 1821-1836
Author(s):  
André Luís Policani Freitas ◽  
Gustavo Antonio Pessanha Monteiro ◽  
Helder Gomes Costa

Purpose Despite existing advances in information technology infrastructure services (ITISs), there remains no consensus in the literature regarding what dimensions or criteria are best suited for the measurement of their quality. The purpose of this paper is to fill this gap, proposing a methodological approach to measuring the quality of ITISs, as perceived by users. Design/methodology/approach Cronbach’s α and item-total correlations were used to measure the reliability of the questionnaire; multiple linear regression analysis was employed to determine the items (criteria) most related to the quality of ITISs; and finally, importance–performance analysis was conducted to determine the most critical criteria in service provision. An exploratory study was conducted to evaluate the quality of ITISs at a Brazilian university. Findings Control of the activities of the information technology (IT) team, periodic maintenance of hardware and software, the security policy and the skill of the labor affect the quality of services most, relative to the dimensions of infrastructure, people and processes. Practical implications The results indicate what dimensions and items should be considered by IT managers to improve the quality of ITISs. Special attention should be paid to the effective use of equipment, software and network infrastructure: it should be ensured that these are in good working order and can be utilized by users who expect to be trained to take advantage of their functions. Originality/value This paper shows how to integrate relevant techniques to assess the quality of ITISs. An original set of criteria to evaluate the quality of ITISs, derived from a systematic review of the literature, is suggested.


Author(s):  
Mark Jeffery ◽  
Cassidy Shield ◽  
H. Nevin Ekici ◽  
Mike Conley

The case centers on Shilling & Smith's acquisition of Xteria Inc. and the resulting need to quickly scale the company's IT infrastructure to accommodate the acquisition. The case is based on a real leasing problem faced by a major retail firm in the Chicago area when it purchased a small credit card processing firm and scaled the operations to handle the retail firm's credit card transactions. The CIO of Shilling & Smith needs to determine which lease option is the best means of providing the technical infrastructure needed to support the firm after the acquisition of Xteria. Several issues will drive this decision, including the value and useful life of the equipment, as well as the strategic context of the firm. This case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, the case addresses software vs. hardware leasing, different lease terms, and choosing between different lease structures depending on the strategy and needs of a company. This case enables students to understand the different types of technology leases and in which situations these leases would be employed.The Shilling & Smith case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, students learn software vs. hardware leasing, different lease terms, and how to choose between different lease structures depending on the strategy and needs of the company. A secondary objective of the case is to teach students the important components and relative costs of information technology infrastructure.


2014 ◽  
Vol 69 (2) ◽  
pp. 137-157 ◽  
Author(s):  
Shogo Mlozi

Purpose – This article aims to test the relationship between expected attractiveness-satisfaction-loyalty for international adventure tourists visiting Tanzania. The proposed model is based on travel consumer behavior theoretical constructs extracted from the literature. Design/methodology/approach – This article aims to test the relationship between expected attractiveness-satisfaction-loyalty for international adventure tourists visiting Tanzania. The proposed model is based on travel consumer behavior theoretical constructs extracted from the literature. Findings – The findings for overall model differed from the moderating factors of high risk, low risk, first-time visit and repeat visit. Also, the results are interesting when satisfaction is tested as a mediator. Practical implications – Practitioners could consider the fact that repeat visits may change tourists’ perceptions toward destination and may even increase their inclination to take on risks. This may impact innovation of consumer products in tourism. Also, policy makers could benefit on how loyalty programs can be developed to increase performance. Originality/value – The study offers specific strategic recommendations toward different groups of tourists (i.e. first-time, repeat visitors, risk averse, risk seeking) and proposes logic for setting up a loyalty program as a long-term strategy for success.


Sign in / Sign up

Export Citation Format

Share Document