A review of methods used on IT maturity models development: A systematic literature review and a critical analysis

2020 ◽  
Vol 35 (2) ◽  
pp. 161-178 ◽  
Author(s):  
Rúben Pereira ◽  
João Serrano

Maturity models can be seen as support tools for an organization. Their importance is increasing in the scientific community and IT (Information Technology) organizations are starting to implement them. The main objective of maturity models is to evaluate and improve the organization’s practices by creating an improvement roadmap. However, the utilization of the methodologies and methods by this community for the development of this kind of tools is not consensual. Several investigators have created guidelines for the development of maturity models, but the authors are not adopting them; they prefer to adopt their own methodologies. In this research, with the objective of reviewing the methodologies, methods, and guidelines used by the scientific community to develop IT maturity models, a Systematic Literature Review and a Critical analysis were made in order to realize a comparison between IT maturity models and Non-IT maturity models. In total, 109 articles of maturity models’ development were analyzed. A discussion of the articles’ results was realized.

2021 ◽  
Author(s):  
Michael Christian Leitner ◽  
Frank Daumann ◽  
Florian Follert ◽  
Fabio Richlan

The phenomenon of home advantage (or home bias) is well-analyzed in the scientific literature and is traditionally an interdisciplinary topic. Current theorizing views the fans as a crucial factor influencing the outcome of a football (a.k.a. soccer) game, as the crowd influences the behavior of the players and officials involved in the game through social pressure. So far, the phenomenon has been difficult to study because, although there have always been single matches where the spectators were excluded, this never happened globally to all teams within a league or even across leagues. From an empirical perspective, the situation with COVID-19 governmental measures, especially the ban of fans from stadiums all over the world, can be interpreted as a “natural experiment” and analyzed accordingly. Thus, several studies examined the influence of supporters by comparing matches before the COVID-19 restrictions with so-called ghost games during the pandemic. To synthesize the existing knowledge after over a year of ghost games and to offer the scientific community and other stakeholders an overview regarding the numerous studies, we provide a systematic literature review that summarizes the main findings of empirical studies and discusses the results accordingly. Our findings - based on 16 studies - indicate that ghost games have a considerable impact on the phenomenon of home advantage. No study found an increased home advantage in ghost games. Rather, our results show that 13 (from 16 included) analyzed studies conclude – based on their individually analyzed data – a more or less significant decrease of home advantage in ghost games. We conclude that our findings are highly relevant from a both socio-economic and behavioral perspective and highlight the indirect and direct influence of spectators and fans on football. Our results have – besides for the scientific community – a high importance for sports and team managers, media executives, fan representatives and other responsible.


2019 ◽  
Vol 10 (1) ◽  
pp. 34 ◽  
Author(s):  
Juan Luis Rubio ◽  
Magdalena Arcilla

One of the main points when implementing the Information Technology Infrastructure Library (ITIL) is which order the processes must be implemented. In the systematic literature review (SLR) developed, it is possible to find references about strategies and factors that ease the implementation of the ITIL, static sequences for the processes to be implemented, and recommendations about the first process to implement, but it is rather complicated to find references that explicitly define the order (adapted to a specific company) of the processes to be implemented. Thus, once it is shown that there is no methodology/algorithm providing a sequence of ITIL processes specifically adapted for each company, an algorithm to solve this problem is presented: The algorithm has a deep mathematical basis and returns a sequence of ITIL processes to optimize the efforts during implementation, so the company implementing the ITIL gets the closest to the competitors. The optimization is made considering parameters such as staff, age of the company, IT size, industry, etc. Thus, the sequence proposed is specific for each company. Finally, a comparative of the sequence obtained (from the proposed algorithm) with sequences discovered in the SLR is presented and applied to a real case.


Author(s):  
Daniël Smits ◽  
Jos van Hillegersberg

IT governance research suggests the existence of a gap between theoretical frameworks and practice. Although current ITG research is largely focused on hard governance (structure, processes), soft governance (behavior, collaboration) is equally important and might be crucial to close the gap. The goal of this study is to determine what IT governance maturity models are available and if there remains a mismatch. The authors conducted a systematic literature review to create an overview of available IT governance maturity models. The study shows five new IT governance maturity models were introduced. Only one of the new IT governance maturity models covers hard and soft IT governance in detail. This model and corresponding instrument was used to illustrate its usability in practice. The authors demonstrate that combining the instrument with structured interviews results in a usable instrument to determine an organization's current maturity level of hard and soft IT governance.


2021 ◽  
Vol 12 (2) ◽  
pp. 138-156
Author(s):  
Indrika Dwi Rahma Suryani ◽  
Elia Kurniawati ◽  
Gracia Angelina Nawang Wulan ◽  
Hikmah Cahya Dinniah

So many cases of fraud have accured in Indonesia as well as the world today has entered the digital era. This study aims to determine with the development of information technology their role in audit practice in detecting fraud in Indonesia. The method used in this research is a systematic literature review using secondary data derived from literature and online media. The results of this study indicate that currently many techniques are used in detecting fraud by employing information technology such as general audit software, computer forensics, DFM (Digital Forensic Model) and whistleblowing systems that are now shifthing to digitization.


Sign in / Sign up

Export Citation Format

Share Document