Business Process Management Advices for Management
The following is a report on the business cases study on Bentley Beverages Premium study. The cases outline the general problems that an owner faces in their business. The problems are outlined as the recovery in their business process management. In the last five years, they have gained them huge opportunities that can only be explored if the company adapt to the digital business process management. The core elements of this business process are appropriate governance of the established accountability of the terms, roles and responsibility for the various levels. The process of operational tactics is also discussed in the following answers to the questions that are raised for the owner. As the companies are becoming demanding about being more productive from their employees, the robust usage of personal devices is being permitted. Therefore, the owner is also concerned of the BYOD issues in hand. Thus, the security in purpose of securing the data and other protection of their work are identified and mitigation steps are discussed. Different benefits of using HR payroll system are discussed for example ensuring exact amount in the salary account are generated in their account. This also helps in payout system. In many cases, it has been seen that the employees are not paid on time. This can be eliminated if the efficiency is enhanced on time. The process of calculating and generating the pay and processing is discussed thoroughly for the betterment and efficiency of the process. In the end the IT service management and service operation system is are thoroughly discussed for Bentley Beverages.
Bentley beverage services were a small enterprise at the beginning of their wholesaling business. However, the last five years have gained them huge opportunities that can only be explored if the company adapt to the digital business process management. The core elements of this business process are appropriate governance of the established accountability of the terms, roles and responsibility for the various levels. The other major element of the strategic alignment of the process is the implementation stage. The linkage of the enterprise process with the strategy is needed. Thus, it must be designed, planned, executed and managed by the managers. The priorities must be cleared with strategy. Other major parts of business process management are different tactical aspect of operational management. The people, their skills and knowledge, the culture and beliefs, methods their tools and techniques are also considered a major part of the lifecycle process. As a 21st century business also must consider the information technology incorporation in their business to optimise the process outcome.
As slowly becoming a multinational company Bentley Beverages must consider implementation of the ERP system to integrate all the information and related process for the company to help them expand. For aligning the holistic approach towards the logistics, finance and operation of the organisation. The ERP platforms for wholesale distribution Wholesale EDGE may integrates as well as optimise all the intermediate process. To automate the logistics process, accelerate the order flow, while target financial excellence this holistic platform should be considered.
Strategic Alignment
Value chain is the model that takes into consideration of the core business process model that also takes into consideration the competitive aspect of the business.
Alignment of the process model with the strategies of the organisation is major component of to increases the longevity and constant validation through the formulated strategy as well as constant improvement of the quality. There are some basics of SOA (start of authority) methodology. To fulfil the strategy and framework alignment process design. It also increases the effectiveness and efficiency of thee process. In the hierarchy, the senior level executive, operational goals and plans and operational executive define the organisational strategies. In the strategy modelling language organisational goals, plans and improved operational objectives are described. SML describes the milestones, that needs to be achieved and what are the key steps to achieve that.
Governance – the best-practised governance of business process are divide in three level
- Executive level – for checking organisation’s performance and increases the responsiveness of the employees
- Process and line managers – their responsibilities include the value chain management of the organisation, improve employee performance, and prioritise improvement.
- Process supervisors are in charge of sub processes and activities in the organisation.
For the operational process, it can be advised to use the features of the Business process management. The key features of this ERP platform can be explored in all aspect of the business.
- Sales and order processing – to handle the multi-channel of suppliers and customers from all over the world customer order guides, price and classification catalogues, online orderings and customer portals are required. This will ensure the smoothness and transparency in order processing and mobile field sales, which are essential part of this feature, will include the currency of information.
- Procurement – supplier chain management and purchases optimisation will solve the vulnerability of holding stocks and load building in securing information from the central system of Bentley Beverage.
- Finance and cost recovery – this key feature will ensure the revenue maximisation in the system. The billing and collection and vendor deviation included in the process management integration. The rebate management and contract management is handled in this platform to ensure the acceleration of getting orders and fulfilling the demand of the customers are executed without hindrance.
- Warehouse and logistics – As the company’s headquarter is situated in Perth and the owner is deciding on increasing the number of offices all over Australia, like Melbourne, Brisbane as well as increasing the number of warehouses this feature will be helpful to automating the scheduling process. Thus inventory control, route management, truckload optimisation; 3Party Logistics services will be helpful. The procurement from the warehouse, back haul scheduling and direct store delivery and getting the real time information will be available for the centre of the management to access at their disposal.
- Enterprises support and business order intelligence feature of the software will include the workforce, travel and quality management all at the same time. Business intelligence dashboards will ensure the currency of any information feed to this integral system.
On the other hand the increase in the number of usage of mobile devices in all aspects of life as well as the organisations have increase the threat of security issues attached with it. As the companies are becoming demanding about being more productive from their employees, the robust usage of personal devices is being permitted. It has also become essential for the companies to accommodate the device usage. This has drastically improved the productivity and given the company a competitive advantage. However, BYOD situation has also bring forth a security issue. As the owner is concerned with the real times information being circulated in the company, this may increase the organisation risk profile.
- The organisation itself has a risk profile and plays a key role in security control. In addition securing the mobile devices needs to be applied in the corporate environment. A diverse device portfolio and functions that includes the application of the devices increases the organisation’s multitude of hardware usage and henceforth lack of awareness may lead to more security issues.
- The functionality a data that are that are exposed in the process through deployment makes the mobile usage vulnerable for security purposes. The credit card processing and personal devices usage would require PCI-DSS compliance. This is a decision support system where the company gets access to limited knowledge of the device being used
- Mobile devices and mobile data security are related to this vulnerability is also a source of threat. Physical access to mobile devices is likely to causes more problem than the servers and workstation hardware. The insecurity of the devices is also a concern. For example, an updated model of iPhone does have data encryption and the older one’s does not.
- Data breach can also be a concern
- Mobile application security as well as the integration of the back-end corporate system and control in the usage is also related to BYOD deployment.
The steps and measure that can be recommended to eliminate the problem of mobility and security regarding personal device usage are listed below.
- The usage scenarios must be evaluated and investigated to mitigate the risk
- Mobile device management should be investigated and monitored
- The pin code, remotely wiping’s, whole device encryption and failed attempt on the login attempts must be monitored
- Certifying hardware system and enterprise usage of security baseline can ensure the device security
- A stringent authentication process to critical business apps and access control on the system can be monitored. As well as the awareness programs needs to be incorporated for betterment.
Application of todays has accelerated all business operations. Theses apps present it with two kinds of security vulnerabilities. They are malicious apps and vulnerabilities of applications. The code embedded apps comprises of the security issues and as illegitimate site, or data interface and other sources other than internet, like local file sharing, Bluetooth, NFC.
The above-mentioned barriers can be countered with the following steps.
- Mobile antivirus programs for systems that are prone to malware vulnerabilities
- To ensure the security process covers the malware programs, leveraging tools and vendors to bridge the gaps in assessments must be ensured.
- Separate In house app stores in BYOD devices must be installed and updated.
- Services for data sharing and simultaneously assessing the need for new apps must be developed.
- Other than the discussion of two risk the BYOD services for support, the operations must be developed to ensure 360 protection for security purposes. An appropriate BYOD support services and management and device usage policies that can be countered.
Managing and supporting the services that can be countered with the BYOD services are one of the most important parts of usage policy. The following are the support standards and services that can enhance the security measures
- Introduce social support for the employees
- Creating patch education and training services to maintain the process adopted
- Introducing mechanism and IT support team and implement the pool of employees for support service solutions. Wiki or knowledge based solution
- Encourage the employees to self-help level.
According to the device management and security features, other things like multiple logins and compartmentalisation will need to be developed and oriented towards the environmental enhancements. Sandboxing can also be recommended. This feature will ensure security in carrying personal Smartphone.
App virtualisation will ensure continuous customisation and integration across platforms. The traditional desktops are not quite utilised and backdated in terms of their utility and cloud version. This end point security on BYOD services will ensure the management of the monitoring services of data across organisation. Deploying endpoint security will also need regulatory policy implemented in the BYOD devices securing process. Taking advice from the legal department from Human resource is also a viable step to mitigate any issues regarding security in future.
Governance
Figure: Payroll accounting system
Source: Stovall and John (2017).
The basic payroll accounting system is has become necessary for the Bentley Beverage Inc. Thus, the company may use it as a group of employees that resides in the company as well as for increasing in different location. To manually or physically calculate the pay keeping in mind to fulfil the legal requirements as well as maintaining obligations and key standards. If the company is multinational or have more than 15 different locations, one must consider the payroll accounting software is available. These softwares ensure a smooth process in calculating the results. The Human resource departments are in charge of payroll systems. Collecting the inputs from different sources and based on the disbursements, those criteria features must be made. The considerations, standard deductions and allowances must be decided thoroughly in terms of accounting system. UltiPro and BambooHR are most of the known human resource software solution packages that are required for this company organisation.
- Ensures exact amount in the salary account are generated in their account.
- This also helps in payout system. In many cases, it has been seen that the employees are not paid on time. This can be eliminated if the efficiency is enhanced on time
- Payroll accounting systems always generates reports on time and in periodical cycle. That is why software always helps each time.
- The legal requirements are met if the softwares are updated.
- Payroll register – employee name details of earnings and net pay, deductions and warrant number. For showing record of all paid employees.
- Warrant registrar summary – listing the cost paid by warrants. It needs warrant number, employee identification, account charged, net pay and vendor amount.
- Direct deposit record – it is needed for cost beared by the company through direct deposit
- Employee tax, deductions, insurance and retirement policies reports – for garnishing legally required
- Gross pay reduction and taxable fringe benefits and medical taxes – are the most important part where detailed record will be used cumulative data filling.
- Distribution of payroll and related cost data for funding sources
- Leave records, balance, leave types and voluntary deductions record with employees signature.
The system must ensure the regulatory compliance and administration in the statutory and regulatory requirements. The processing of the payments and relevant decision support capabilities must be given emphasis. The functional requirements are the divided in six part of work.
Calculating the payment at the end with Attendance and Time processing functions must be reverted to personal actions. Based on the effective dates, the adjustment must be made with priority. The retroactive calculations and hour adjustments also should be made proactively to avoid any last minute adjustments, which make it a complex process. The pay entitlements, calculations of overtime, differentials based on calculative hours, premiums, application of caps and limitations, supplemental pay actions must be appropriately implemented with the calculations.
- Calculating the deductions mandatorily according retirement, local, federal and taxation laws must be taken into consideration
- Voluntary deductions for multiple taxing authorities also must be calculated
- Mandatory deductions also must be considered
The process deductions according the regulatory limitations must be computed for each type of deduction.
Leave, payments, benefits data must be maintained properly. This will further help in calculations. Supporting the payroll adjustments and regularly calculating the information to the core financial years and information system is necessary. Adjustable taxable payment and calculating gross pay must be given more emphasis for further allotment of payment decisions. Offsetting dollar amount and advances are equal to the receivables to the agency. The earnings based on per period basis also must be applied.
Allowing the personal payroll information in employees discretion like savings information, tax withholding information, electronic fund transfer information and allotments are to be maintained in order to make a decision of basic pay. The record of pay period must be effectively maintained. With the gross and net pay, the standard ledger must be maintained. This will also ensure the possible compensatory management in the future payout. The data of employee indebtedness and health benefits are supporting information that must be maintained.
The unemployment compensatory management to maintain data on severance pay, off-cycle and third party payment, lump sum payment all this are part of generating output through the payments. Generating payment for benefiting unpaid compensation must also be considered in terms of transactional information must be maintained in generating the output. Accommodating information for transactions in accrual pay basis also must prepare in this stage. The pay processing functions consist of internal and external pay report. This will also be processed in time and detailed analysis of the pay transactions must be established while deciding on the payments of their employees.
Operation and Tactical Advantages
As implementing an It service is suggested in the answer 1, which is an ERP system for the company to align and integrate its business process. The IT management will include the technologies and investment in computer hardware and software, network and data management and support or employees to maintain them. This is a different from the management information system. The primary focus of this teams remains in improving the technologies and aligning that with the business strategies. The different area of IT management are aligning the business with the IT strategy, IT governing, IT services management and Configuration management.
Figure: IT service management
Source: Paki and Sirous (2015)
It service management includes the activities and policies, process and supporting procedures for Information Technology. In addition, network management and IT system management must be better than continual improvements. Infrastructure technology Infrastructure library is a foundation of standards directed for IT system and frameworks for ITSM.
The most popular and essential type of IT service management plan is Converged infrastructure. It is an optimised computing process and package that includes the data, servers, networking equipment, orchestration of devices and automation.
The five most important component element of ITSM that must be considered while considering the framework are
- Service strategy – this consist of the financial, service portfolio, strategy and demand management. Designing a strong portfolio will ensure the service pipeline and catalogue formation of the services. This would also lead to demand management and of the patterns of user profile and pattern of business services. Steps of financial management while tracking accounting, charging the customers and budgeting the provider should be ensured in this stage. Therefore, it can be recommended that service strategy is the most essential process of the system.
- Service design – this strategy for the Bentley beverages owner must include the service level management, availability and capacity management, continuity and information security management service catalogue. The four P’s of service design are people, process, partners and products. People emphasises on organisational human resource that supports the services, processes are also part of the support. Partners are third parties that require additional support. Service catalogue management of thee company takes care of the user-friendliness of the technologies among customers as catalogues. Availability and capacity management is also component that needs to be considered in this stage of IT service management.
- Service transition – this part consist of the change management implementation. Simultaneously, in this stage the planning and support of the service design, also validating and testing the implemented change should be accommodated too. Knowledge management should also be considered in this stage. The project management, coordinating resources and deploy the project with clearly calculating cost, time and quality, must be considered in this stage. Application development through the services available for the customers is part of this transition. To ensure the IT operations are supportive of the new service, it should be given emphasis in this process.
- Service operations – this includes all the help and support from the end must be considered and managed. In this part of this stage are categorising filters according the events, incident management. In addition, the problem management regarding the data and security as well as proactively seeking day to day managerial problems are resolved in this stage. The facilities, application and technological management should be part of this process. The main objective is to make sure the IT services are delivered effectively and efficiently. To eliminate all thee disruption this process is necessary to be implemented.
- Continuously improving the services – the main objective of continuous improvement in this stage is to gauge the effectiveness of the process implemented. Evaluating the process and taking CSI (Continuous Service Initiatives) is to evaluate the end result of the service management. Maturity assessments and auditing and monitoring for services are also part of the process
Figure: IT service lifecycle
Source: Paki and Sirous (2015)
Service operations has become most essential part of thee service process. It is the foundation of the service management and ITIL. Infrastructure library is build in order to ensure the services are effectively or efficiently delivered. The criteria to implement this are to fulfil all the stages of service operation lifecycle. For example, meeting the user request, resolving service, fixing problems occurred in the channel and failures, including all operational tasks. Thus, the owner of the Bentley beverage can seek to minimise those mentioned factor by service operation process discusses below. . Service operation delivers the service on an ongoing basis, overseeing the daily overall health of the service. This includes managing disruptions to service through rapid restoration after incidents; determining the root cause of problems and detecting trends associated with recurring issues; handling daily routine end-user requests; and managing service access.
Main objective of this process is to evaluate and monitored, categorise all the actions in the process and lead to effectiveness. However, the critical part of this process is to ensure all the regarded and appropriate actions are assessed. Bentley Beverages have different actions to be fulfilled regarding order processing and event management all through Australia.
The process objective is to maintain the lifecycle of incidents and increasing service capability. Bentley Beverage can increase all the process times with incident management like increasing the order processing system and fulfilling requests from different outlets of retailers.
Services requests from different outlets can be fulfilled is the access of the resources of Bentley. The Process Objective is to fulfil Service Requests, which in maximum cases are minor (standard) Changes (For example requests to change a password) or requests for updated information.
Granting authorization to users to use a service, whereas preventing access to non-authorized users is method to ensure the accessibility is secured. The Access Management processes essentially execute policies defined in Information Security Management. Access Management is sometimes also referred to as Rights Management or Identity Management
BYOD and Mobility Issues Advices in Management
This step is to manage all the life cycle of arising problems and prevent unwanted situations from arousing this stage of management is needed. The collection of relevant data from different sources and using it for future advantage must be done in this stage. The IT trends and problem management is known as the significant part of the problems.
IT control in the execution of the service management is also a significant part of the process. The job scheduling and [backup services are to restore activities and output management, with routine management.
This process is used where the physical environment of the central IT system is managed. This also manages different aspect of physical environment. Building the helping equipment of access management and monitoring them comes under this process.
This stage is dedicated to managing application throughout the lifecycle. The applications that are used for backup is used in this stage is liable to resolving a simplifying the operation.
Technical Management provides proficiency and support for management in IT infrastructure. The objective of this is to make sure that IT services are delivered effectively and efficiently. In this service operation stage, time the main idea is to handle the key performance indicators of the operations. This will ensure the management is effective in solving all the problems at hand. The number of response time, resolution time, unresolved and resolved problems and their degree can be used as performance indicator. Different services includes different indicators. Thus based on the nature of the company and industry the organisation belong to, the metrics should be determined.
Conclusion
Therefore, from the above text it can be concluded that the company is undergoing a shift for their plan of expanding in the international market. In the above text the issues that the owner has highlighted is explained and recommendations based on the process has been given. The Service operations has become most essential part of thee service process. It is the foundation of the service management and ITIL. Infrastructure library is build in order to ensure the services are effectively or efficiently delivered. The criteria to implement this are to fulfil all the stages of service operation lifecycle. The implementation of the ERP and business process cycle has been outlined for the company owner. The basic payroll accounting system is has become necessary for the Bentley Beverage Inc. Thus, the company may use it as a group of employees that resides in the company as well as for increasing in different location. The process of this has been given in the following chapter. The essentials for the BYOD situation are given in the chapters and to prevent the unnecessary outcomes.
References
Abdullah, Nuru Aisyah Sim, Noor Laila Mohd Noor, and Emma Nuraihan Mior Ibrahim. “Information Technology Service Management (ITSM): contributing Factors to IT Service disruptions-a Case of Malaysia Public Service Agencies.” In PACIS, p. 185. 2014.
Bello, A.G., Murray, D. and Armarego, J., 2017. A systematic approach to investigating how information security and privacy can be achieved in BYOD environments. Information & Computer Security, (just-accepted), pp.00-00.
To Secure the Devices of the Employees
Cates, Steven V. “Administration and Payroll: The Creation of a Professional Payroll Using Software.” Handbook of Human Resources Management (2015): 1-5.
Chang, James F. Business process management systems: strategy and implementation. CRC Press, 2016.
Dhingra, M., 2016. Legal issues in secure implementation of bring your own device (BYOD). Procedia Computer Science, 78, pp.179-184.
Ding, Yi. “Service Delivery Standards (ITIL, COBIT, ETOM, ISO/IEC 20000, Etc.).” Wiley Encyclopedia of Management(2015).
Eikebrokk, T.R. and Iden, J., 2017. Strategising IT service management through ITIL implementation: model and empirical test. Total Quality Management & Business Excellence, 28(3-4), pp.238-265.
Garba, A.B., Armarego, J., Murray, D. and Kenworthy, W., 2015. Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of Information privacy and security, 11(1), pp.38-54.
Garba, Abubakar Bello, Jocelyn Armarego, and David Murray. “A policy-based framework for managing information security and privacy risks in BYOD environments.” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)4, no. 2 (2015): 189-198.
Goldkuhl, Göran, and Malin Nordström. “Challenges in IT service management: institution vs. improvisation.” In the 3rd International workshop on IT Artefact Design & Workpractice Improvement, Friedrichshafen, pp. 1-15. 2014.
Guenther, Fabian. “Meta-model for monitoring payroll processes across a network.” U.S. Patent Application 14/176,680, filed February 10, 2014.
Islam, Kashif, Abdur Rehman CH, AHMAD RAZA Bilal, and M. U. H. A. M. M. A. D. Ilyas. “Accounting Information Systems: Traditions and Future Directions (By Using AIS in Traditional Organizations).” The Journal of Internet Banking and Commerce22, no. 2 (2017): 1-13.
Jäntti, Marko, and Aileen Cater-Steel. “Proactive Management of IT Operations to Improve IT Services.” JISTEM-Journal of Information Systems and Technology Management 14, no. 2 (2017): 191-218.
Jäntti, Marko, and Virpi Hotti. “Defining the relationships between IT service management and IT service governance.” Information Technology and Management 17, no. 2 (2016): 141-150.
Jeston, John, and Johan Nelis. Business process management. Routledge, 2014.
Laudon, Kenneth C., and Jane P. Laudon. Management information system. Pearson Education India, 2016.
Lebek, B., Degirmenci, K. and Breitner, M.H., 2013. Investigating the influence of security, privacy, and legal concerns on employees’ intention to use BYOD mobile devices.
Leon, Alexis. Enterprise resource planning. McGraw-Hill Education, 2014.
Lowry, P.B., Dinev, T. and Willison, R., 2017. Why Security and Privacy Research Lies at the Centre of the Information Systems (is) Artefact: Proposing a Bold Research Agenda.
Lusch, Robert F., and Stephen L. Vargo. The service-dominant logic of marketing: Dialog, debate, and directions. Routledge, 2014.
Majanoja, Anne-Maarit, Erkki Tervala, Linnéa Linko, and Ville Leppänen. “The Challenge of Global Selective Outsourcing Environment: Implementing Customer-Centric IT Service Operations and ITIL Processes.” Journal of Service Science and Management 7, no. 06 (2014): 396.
Marshall, S., 2014. IT consumerization: A case study of BYOD in a healthcare setting. Technology Innovation Management Review, 4(3).
Mora, Manuel, Jorge Gomez, Rory O’Connor, Mahesh Raisinghani, and Ovsei Gelman. “An extensive review of IT service design in seven international ITSM processes frameworks: Part II.” International Journal of Information Technologies and Systems Approach 8, no. 1 (2015): 69-90.
Nabais, João, Alexandre Miguel Pinto, António Cruz, and Jorge Cardoso. “Interface design for IT service management practice.” In Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on, pp. 1-7. IEEE, 2014.
Nwankpa, Joseph K. “ERP system usage and benefit: A model of antecedents and outcomes.” Computers in Human Behavior 45 (2015): 335-344.
Officer, Chief Financial. “Payroll Practices.” Policy (2016).
Olalere, M., Abdullah, M.T., Mahmod, R. and Abdullah, A., 2015. A review of bring your own device on security issues. Sage Open, 5(2), p.2158244015580372.
Paki, Hasan, and Sirous Fakhimi Azar. “Identification and Prioritization of Obstacles of Implementation of Human Resource Accounting System by TOPSIS.” Journal of Management Sciences 1, no. 3 (2015): 23-31.
Rosemann, Michael, and Jan vom Brocke. “The six core elements of business process management.” In Handbook on business process management 1, pp. 105-122. Springer Berlin Heidelberg, 2015.
Seethamraju, Ravi. “Adoption of software as a service (SaaS) enterprise resource planning (ERP) systems in small and medium sized enterprises (SMEs).” Information systems frontiers 17, no. 3 (2015): 475-492.
Shaul, Levi, and Doron Tauber. “Critical success factors in enterprise resource planning systems: Review of the last decade.” ACM Computing Surveys (CSUR) 45, no. 4 (2013): 55.
Steinberg, Randy A. Measuring ITSM: Measuring, Reporting, and Modeling the IT Service Management Metrics that Matter Most to IT Senior Executives. Trafford Publishing, 2013.
Stovall, O. Scott, and John D. Neill. “The Ethical Implications of Human Resource Accounting.” (2017).
Thite, Mohan, and Kuldeep Sandhu. “Where is My Pay? Critical Success Factors of a Payroll System–A System Life Cycle Approach.” Australasian Journal of Information Systems 18, no. 2 (2014).
Tian, Feng, and Sean Xin Xu. “How Do Enterprise Resource Planning Systems Affect Firm Risk? Post-Implementation Impact.” Mis Quarterly 39, no. 1 (2015).
Van Der Aalst, Wil MP. “Business process management: a comprehensive survey.” ISRN Software Engineering 2013 (2013).
Van der Linden, Sean, Scott Faber, Mark Halstead, and Ebbe Altberg. “System and method to merge pay-for-performance advertising models.” U.S. Patent 9,202,219, issued December 1, 2015.
Wijesinghe, Ravinda, Helana Scheepers, and Stuart Mcloughlin. “Defining the optimal level of business benefits within IS/IT projects: Insights from benefit identification practices adopted in an IT Service Management (ITSM) project.” arXiv preprint arXiv:1606.03537 (2016).
Will, Liane, Veit Köppen, and Gunter Saake. “Flexibility in SOA Operations: The Need for a Central Service Component.” In Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW), 2014 IEEE 18th International, pp. 306-315. IEEE, 2014.
Yazici, Ali, Alok Mishra, and Paul Kontogiorgis. “IT Service Management (ITSM) Education and Research: Global View.” INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION31, no. 4 (2015): 1071-1080.
Zahadat, N., Blessner, P., Blackburn, T. and Olson, B.A., 2015. BYOD security engineering: A framework and its analysis. Computers & Security, 55, pp.81-99.