Trends in ICT Service Management

Article Preview

Abstract:

The importance of information technology service management, ITSM, is fully recognized today. All companies, regardless of their size, accept the role of IT services and products, as the main supports for decision and control activities. The present contribution aims to analyze the main steps in the evolution of ITSM and its evolvement as a well-defined domain. There are analyzed, also, the main economical and technical factors influencing its evolution - the increase of competition among the IT service providers, the technical progress in hardware and availability of digital technologies.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

715-720

Citation:

Online since:

May 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Rouse, Tech Target, 2005, http: /searchcio. techtarget. com/definition/ICT-information-and-communications-technology-or-technologies.

Google Scholar

[2] J. Vorisek, J. Jandos, J. Feuerlicht, SPSPR Model - Framework for ICT Services Management, Journal of Systems Integration, 2 (2011), 3-10.

DOI: 10.20470/jsi.v2i2.85

Google Scholar

[3] J. van Bon (editor), Foundations of IT Service Management Based on ITIL V3, itSMF International, Van Haren Publishing, Zaltbommel NL, (2007).

Google Scholar

[4] M. Jemala, Systemic Outlook in Technology- Management Trends of Best Technology/ICT Companies, Organizacija, 46 (2013), 143-156.

DOI: 10.2478/orga-2013-0012

Google Scholar

[5] R. Safian, The World's Most Innovative Companies, FastCompany-2014, http: /www. fast company. com/section/most-innovative-companies-(2014).

Google Scholar

[6] From Digitally Disrupted to Digital Disrupter, Accenture Technology Vision 2014, http: /www. accenture. com/SiteCollectionDocuments/PDF/Accenture-Technology-Vision-2014. pdf (accessed on 12. 07. 2014).

Google Scholar

[7] R. McLaughlin, What's the Internet of Things' Enterprise Potential?, TechTarget, July, 2014. Available at http: /searchconsumerization. techtarget. com/feature/Whats-the-Internet-of-Things-enterprise-potential.

Google Scholar

[8] Information on http: /www. microsoft. com/en-us/microsoftservices/it_trends. aspx.

Google Scholar

[9] Microsoft Enterprise. Available at http: /www. microsoft. com/enterprise/default. aspx#fbid= XxQYOCOREB8 (accessed on July 2014).

Google Scholar

[10] Oracle, http: /www. oracle. com/us/corporate/investor-relations/financials/fy2013-form-10k-1966521. pdf.

Google Scholar

[11] IBM Systems Magazine, http: /www. ibmsystemsmag. com/mainframe/trends/Cloud-Computing.

Google Scholar

[12] Information on http: /bobcares. com/blog/virtualization-or-physical-server.

Google Scholar

[13] D. Gašević, M. Hatala, Model-driven Engineering of Service-oriented Systems: A Research Agenda, International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 1 (2010) 17-32.

DOI: 10.4018/jssmet.2010010102

Google Scholar

[14] I. Manolescu, M. Brambilla, S. Ceri, S. Comai, P Fraternali, Model-Driven Design and Deployment of Service-Enabled Web Applications, ACM Transactions on Internet Technology, 5, (2005) 439–479.

DOI: 10.1145/1084772.1084773

Google Scholar

[15] Cisco 2014 Annual Security Report: Available at http: /www. cisco. com/web/offer/gist_ty2 _asset/Cisco_2014_ASR. pdf.

Google Scholar

[16] Information on http: /en. wikipedia. org/wiki/Mobile_business_intelligence.

Google Scholar

[17] A. P. Felt, D. Wagner, Phishing on Mobile Devices, Proceedings of the IEEE Web 2. 0 Security and Privacy Workshop (W2SP) (2011). Accessible at http: /www. eecs. berkeley. edu/~daw/papers/ mobphish-w2sp11. pdf.

Google Scholar

[18] C. Amrutkar, P. Traynor, P. C. van Oorschot, An Empirical Evaluation of Security Indicators in Mobile Web Browsers, Technical Report GT-CS-11-10, Georgia Institute of Technology, 2011. Available at https: /smartech. gatech. edu/jspui/bitstream/1853/43376/3/GT-CS-11-10_final_tech_ report. pdf.

DOI: 10.1109/tmc.2013.90

Google Scholar

[19] L. Agurkis, CA Technologies, CA Technologies Empowers Enterprise Mobility, Press release, 2013. Information on http: /www. ca. com/us/news/press-releases/na/2013/ca-technologies-empowers-enterprise-mobility. aspx.

Google Scholar

[20] D. Hwang, IT pros evaluate Office for iPad, mull Office 365 and end user support, TechTarget, 03 Apr 2014. Available at: http: /searchconsumerization. techtarget. com/news/2240217499/IT-pros-evaluate-Office-for-iPad-mull-Office-365-and-end-user-support.

DOI: 10.1007/978-1-4842-1197-7_2

Google Scholar

[21] Ed Scannell, J. O'Donnell, IBM-Apple deal to yield iOS business apps, cloud services, TechTarget, 16 Jul 2014. Available at: http: /searchconsumerization. techtarget. com/news/ 2240224710/IBM-Apple-deal-to-yield-iOS-business-apps-cloud-services.

Google Scholar

[22] Computer Weekly and TechTarget IT Priorities Survey 2014 – analysis, a special report from ComputerWeekly, at http: /book. itep. ru/depository/forecasts/prem_IT_priorities_2014_ FINAL. pdf.

Google Scholar

[23] Technology Priorities for 2014, a TechTarget IT Priorities Survey, March 2014 (accessed by registered demand).

Google Scholar

[24] H. G. Gomez, M.D.A. Serna, R.F.O. Badenes, Evolution and Trends of Information Systems for Business Management: The m-Business. A review, Dyna, 77 (2010) 181-193.

Google Scholar

[25] J. Vorisek, G. Feuerlicht, Trends in the Delivery and Utilization of Enterprise ICT, in: M. Khosrow (editor) Emerging Trends and Challenges in Information Technology Management, Idea Group Inc., Hershey, USA, 2006, pp.118-121.

Google Scholar