scholarly journals Model to Optimize the Decision Making on Processes in IT Departments

Mathematics ◽  
2021 ◽  
Vol 9 (9) ◽  
pp. 983
Author(s):  
Juan Luis Rubio Sánchez

The objective of this article is the definition of an algorithm aimed to settle the sequence of implementation of Information Technology Infrastructure Library (ITIL) processes that should be followed in the technology departments for its proper management. The mathematical model presented solves the question of the best ITIL process to implement by using an optimization function that considers the objectives and restrictions given by the company. This model is the basis for an iterative greedy algorithm proposed that generates the optimal sequence of ITIL processes to implement. The algorithm has been proven in a company with satisfactory results: the proposed sequence of implementation allowed the company to properly manage the IT department as well as get close to competitors based on the objectives and restrictions reported by the company. The novelty of this contribution relies on the design of an algorithm to generate an optimal and specific sequence of ITIL processes to implement in the IT department of a company, as the previous solutions relied on generic sequences or required external consultants to get their opinion and so did not have a mathematical basis.


Computation ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 60
Author(s):  
Juan Luis Rubio Sánchez

The most important standard in technology services management is the Information Technology Infrastructure Library (ITIL). The literature review developed shows that one of the most important questions to answer is finding the sequence of processes to be implemented, mainly in small companies with few resources. The purpose of this paper is to show a methodology that defines an optimal specific sequence of processes for each small company depending on internal and external parameters. The main contribution of this paper is a proven methodology to obtain a particular sequence of ITIL processes specifically adapted to each company, based on a mathematical and statistical model that uses data from a web survey. Its application generates an optimal sequence of ITIL processes. The methodology has been applied with successful results in a real case, and it shows specific benefits over the previous approaches. The main learning objective of this research is a proven method to obtain an optimal sequence of processes for the implementation of ITIL in small companies. Finally, some future works are presented.



Author(s):  
Mark Jeffery ◽  
Cassidy Shield ◽  
H. Nevin Ekici ◽  
Mike Conley

The case centers on Shilling & Smith's acquisition of Xteria Inc. and the resulting need to quickly scale the company's IT infrastructure to accommodate the acquisition. The case is based on a real leasing problem faced by a major retail firm in the Chicago area when it purchased a small credit card processing firm and scaled the operations to handle the retail firm's credit card transactions. The CIO of Shilling & Smith needs to determine which lease option is the best means of providing the technical infrastructure needed to support the firm after the acquisition of Xteria. Several issues will drive this decision, including the value and useful life of the equipment, as well as the strategic context of the firm. This case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, the case addresses software vs. hardware leasing, different lease terms, and choosing between different lease structures depending on the strategy and needs of a company. This case enables students to understand the different types of technology leases and in which situations these leases would be employed.The Shilling & Smith case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, students learn software vs. hardware leasing, different lease terms, and how to choose between different lease structures depending on the strategy and needs of the company. A secondary objective of the case is to teach students the important components and relative costs of information technology infrastructure.



Author(s):  
Nabie Y. Conteh ◽  
Paul J. Schmick

The broad objective of this study is to evaluate the vulnerabilities of an organization's information technology infrastructure, which include hardware and software systems, transmission media, local area networks, wide area networks, enterprise networks, intranets, and its use of the internet to cyber intrusions. To achieve this objective, the chapter explains the importance of social engineering in network intrusions and cyber-theft and the reasons for the rapid expansion of cybercrime. The chapter also includes a complete description and definition of social engineering, the role it plays in network intrusion and cyber identity theft, a discussion of the reasons for the rise in cybercrimes, and their impact on organizations. In closing the authors recommend some preventive measures and possible solutions to the threats and vulnerabilities of social engineering. The chapter concludes that while technology has a role to play in reducing the impact of social engineering attacks, the vulnerability resides with human behavior, human impulses, and psychological predispositions.



2019 ◽  
Vol 10 (1) ◽  
pp. 34 ◽  
Author(s):  
Juan Luis Rubio ◽  
Magdalena Arcilla

One of the main points when implementing the Information Technology Infrastructure Library (ITIL) is which order the processes must be implemented. In the systematic literature review (SLR) developed, it is possible to find references about strategies and factors that ease the implementation of the ITIL, static sequences for the processes to be implemented, and recommendations about the first process to implement, but it is rather complicated to find references that explicitly define the order (adapted to a specific company) of the processes to be implemented. Thus, once it is shown that there is no methodology/algorithm providing a sequence of ITIL processes specifically adapted for each company, an algorithm to solve this problem is presented: The algorithm has a deep mathematical basis and returns a sequence of ITIL processes to optimize the efforts during implementation, so the company implementing the ITIL gets the closest to the competitors. The optimization is made considering parameters such as staff, age of the company, IT size, industry, etc. Thus, the sequence proposed is specific for each company. Finally, a comparative of the sequence obtained (from the proposed algorithm) with sequences discovered in the SLR is presented and applied to a real case.



2019 ◽  
Vol 21 (2) ◽  
pp. 169
Author(s):  
Triana Wulandari

This study attempts to find out how best in optimizing operational handling technology in a company. Any company that uses technology as bagain of business can optimize it have to be investment in technology and the opportunities greater sustainability. Way as on the optimizing operational is to provide several a standard procedure that is we can the adoption of itil v3 so that a groove of work and evaluation can be executed with optimal.With the introduction of the optimization of workflow then it is hoped the process of change can be detected faster so that the sustainability of. petrifaction in his business.The procedures to be furnished event management, among others incident management, fulfillent, request the problem of management and permissions. Keyword:Service operation, ITIL, Procedure



Author(s):  
Mohammad Dadashzadeh Dadashzadeh ◽  
T.J. Wharton

In this paper, we consider the application of Green Value Stream Mapping for greening the information technology functional area of organizations. We advocate the use of Information Technology Infrastructure Library (ITIL) processes to consider value stream maps for both the manufacturing side of the IT department as well as its service delivery arm. In addition, we present steps to be taken by the IT department to eliminate waste in each of seven green waste areas and consider the impact of new technologies for greening the IT department.



Computers ◽  
2021 ◽  
Vol 10 (1) ◽  
pp. 8
Author(s):  
Juan Luis Rubio Sánchez

Educational centers (schools, academies, high schools, etc.) are usually small companies, which make them special in terms of management. The management of IT services is far from standard and based in home solutions. The disadvantage of this approach is clear, as it happened during the COVID-19 pandemic period. The solution to properly managing IT services is based on the use of the ITIL (Information Technology Infrastructure Library). The question is how to apply this standard that only defines the processes to implement, but does not describe the way or the order to implement them. In this article it is shown which IT processes are really needed in any educational center and the order in which they should be implemented. The method used consists of fulfilling a knowledge database with extensive information from schools, academies, and other educational centers. After that, an existing optimization model is adopted and a representative learning center is defined, which is used to propose the IT processes sequence; finally, a set of optimal IT processes and the order to implement them is defined. These ordered processes optimize the quality of IT for learning services. The main result is an ordered set of IT processes that best fit the needs of IT departments in small educational centers.



KOMTEKINFO ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 49-56
Author(s):  
Deval Gusrion

The audit of the Information Technology infrastructure in this journal uses the ISO 27001 standard which is carried out at a company engaged in the service sector in West Sumatra Province. As a company that is quite developed and already has an adequate IT infrastructure in running its business, it is felt necessary to carry out an IT audit to ensure whether the IT devices they have already have adequate internal controls and at the same time as preventive measures for business risks such as: operational, reputation , legal, compliance and strategic. Given that IT is an important asset in operations that can increase the added value and competitiveness of a company while its implementation contains various risks, companies need to implement IT Governance.



KOMTEKINFO ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 49-56
Author(s):  
Deval Gusrion

The audit of the Information Technology infrastructure in this journal uses the ISO 27001 standard which iscarried out at a company engaged in the service sector in West Sumatra Province. As a company that is quitedeveloped and already has an adequate IT infrastructure in running its business, it is felt necessary to carryout an IT audit to ensure whether the IT devices they have already have adequate internal controls and at thesame time as preventive measures for business risks such as: operational, reputation , legal, compliance andstrategic. Given that IT is an important asset in operations that can increase the added value andcompetitiveness of a company while its implementation contains various risks, companies need toimplement IT Governance.



Neurology ◽  
2020 ◽  
Vol 94 (24) ◽  
pp. 1077-1087 ◽  
Author(s):  
Scott N. Grossman ◽  
Steve C. Han ◽  
Laura J. Balcer ◽  
Arielle Kurzweil ◽  
Harold Weinberg ◽  
...  

The COVID-19 pandemic is causing world-wide social dislocation, operational and economic dysfunction, and high rates of morbidity and mortality. Medical practices are responding by developing, disseminating, and implementing unprecedented changes in health care delivery. Telemedicine has rapidly moved to the frontline of clinical practice due to the need for prevention and mitigation strategies; these have been encouraged, facilitated, and enabled by changes in government rules and regulations and payer-driven reimbursement policies. We describe our neurology department's situational transformation from in-person outpatient visits to a largely virtual neurology practice in response to the COVID-19 pandemic. Two key factors enabled our rapid deployment of virtual encounters in neurology and its subspecialties. The first was a well-established robust information technology infrastructure supporting virtual urgent care services at our institution; this connected physicians directly to patients using both the physician's and the patient's own mobile devices. The second is the concept of one patient, one chart, facilitated by a suite of interconnected electronic medical record (EMR) applications on several different device types. We present our experience with conducting general teleneurology encounters using secure synchronous audio and video connections integrated with an EMR. This report also details how we perform virtual neurologic examinations that are clinically meaningful and how we document, code, and bill for these virtual services. Many of these processes can be used by other neurology providers, regardless of their specific practice model. We then discuss potential roles for teleneurology after the COVID-19 global pandemic has been contained.



Sign in / Sign up

Export Citation Format

Share Document