SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Abstract
This paper relates to an R&D project – called NOEMI
1
The model developed in the project focuses on the usual IT activities of the SME’s, which are
classified in five domains: infrastructure, support, management, security, and documentation.
The NOEMI model has been successfully experimented with PME partners for validation pur-
pose.
– aiming to propose to SME’s a col-
laborative management of their respective information systems in terms of quality, reliability
and cost. The targeted SME are those without IT dedicated internal staff.
This paper insists on the experimentation of the NOEMI model. The results are discussed and
compared with other classical solutions usually encountered within IT practices of SME’s. The
last part of the paper draws the perspectives opened with the model according to the results of
its experimentation.
Keywords
IT Service Management, collaborative management, SME, process assessment, process im-
provement.
1
Nouvelle Organisation de la Maitenance et de l’Exploitation Informatiques
NOEMI, a collaborative management
for ICT process improvement in SME:
experience report
Bernard DI RENZO, Christophe FELTUS, Sylvie PRIME
Session I: Management of the failure correction process
1 Introduction
It sounds obvious that SME’s competitiveness is more and more linked to the quality and the reliability
of their information systems. Nevertheless hiring an IT dedicated staff is often discouraged due to the
small size of the IT infrastructure of the SME’s. The NOEMI project addresses this critical issue for the
SME’s and has developed a relevant solution to bridge the gap between the mandatory need of quality
in IT infrastructure of the SME’s and the dramatic lack of internal skills. The solution is based on the
creation of clusters of SME’s aiming to increase IT infrastructure volume. The global IT activities within
the clusters is then manageable in a collaborative way, which can lead to higher quality and reliability
as larger IT departments would provide.
This paper reviews briefly the NOEMI collaborative model developed by the Centre Henri Tudor, its
validation by a case study, its positioning regarding alternative solutions and at last, as conclusion and
perspective, the transfer of the research results to the market.
2 The NOEMI model
The NOEMI model relies on partners, gathered in clusters. A common dedicated operational team
performs their IT activities and is managed on a regular
basis by an IT Coordination Committee (the CCI).
Figure 1 illustrates the organisational frame of the
model.
This chapter explains the references used to create the
model, the openness of the cluster and its manage-
ment.
2.1 The baseline and the refer-
ences
The NOEMI model is built on 5 areas:
1. Management,
2. Service Support,
3. Infrastructure,
4. Security,
5. Documentation.
These five areas include 20 processes tailored for use a SME environment [1]. For each area, a set of
activities are defined, performed by the operational team and controlled by the CCI.
Development has been partially inspired by ISO/IEC TR 15504 [2] and ITIL [3, 4, 5 and 6].
2.2 Constitution of SME’s clusters
The NOEMI model allows the increase or decrease of the number of SME partners in a cluster. Before
a new SME joins the cluster, a capability profile of each area is defined according to a specific as-
Figure 1: Organisational frame
of the NOEMI model
Session I: Management of the failure correction process
sessment method developed in the NOEMI project [7].
The NOEMI assessment method is directly inspired by ISO/IEC TR 15504 [2].
This assessment analyses in depth the weaknesses and the strengths of the 20 processes defined in
the model and defines a capability profile of the 5 domains. A list of pragmatic improvement actions to
take according to urgency and impact is proposed.
The results of the assessment are used as a reference for the IT operational team for the first steps
when the new SME is entering the cluster.
2.3 Evolution of the IT Infrastructure
Following the recommendations, a lot of
changes and manpower are required to imple-
ment the most urgent and important activities.
This phase, called “Up To Date Phase” will take
from 6 to 9 months.
The stabilization phase will then start.
It is to notice that, in this phase, the number of
incidents will decrease in opposition with the
number of requests, which will get higher.
Figure 2 illustrates the main phases in the
model implementation.
2.4 Management of the SME
Clusters
After assessment and depending on the improvement actions agreed with the SME, the operational
team will handle all activities and the 20 defined processes. A particular focus is put on incident man-
agement, change management and configuration management assumed as the most critical IT proc-
esses in SME’s [8].
The operational team provides manpower for the activities needed to improve the capability level of
each area. The size of the team is linked to the global IT infrastructure of the cluster and includes both
technical staff and project leader. Team members are qualified (IT or project management), can act
autonomously, and have strong relationship skills.
The operational team is managed the CCI where a representative manager from each SME stands.
The main objectives of this committee is to ensure:
• the coherence between the cluster and the own objectives and strategy of each SME,
• the convergence of IT improvements,
• the evaluation of preventive and corrective actions.
The committee bases its management action on a balanced set of indicators within financial, partner’s
satisfaction, activity efficiency, and people skills [9].
Moreover, the capability profile of each SME is followed up on the basis of the assessment and re-
viewed on a regular basis (6-12 months).
Figure 2: Implementation phases
of the NOEMI model
Session I: Management of the failure correction process
3 Case study and validation
The model NOEMI, as shortly described above, has been validated through a case study. This chapter
focuses on this experimental validation according to three perspectives: economic health of the ex-
perimental cluster, its management and the satisfaction of the SME’s of the cluster.
3.1 Economic health of the cluster
The financial management of the IT activities within the cluster is based on the balance between the
costs and the charges. The total cost is the sum of the IT staff charges, travel costs of the IT staff,
training, equipments (laptop, mobiles, etc.), and miscellaneous charges (phone call, Internet access,
etc.)
In the case study, no benefit is down because the cluster is the ownership of the SME.
This total cost is transparently financed by each SME of the cluster and is apportioned to their IT infra-
structure, according to an empirical calculation. Each server has a 10 points value, each PCs has a 1
point value on which 20 points are added to enter the project. The point represents a certain financial
value. With this simple and clear calculation, the SME’s know exactly how much their IT service will
cost on a monthly basis and on an annual basis. Here under, the main advantages related to the eco-
nomic health of the cluster:
• budgeting becomes very easy,
• hardware and software investment gets also easier as the inventory helps efficiently in making
the decision,
• the workload related to IT activities has been reduced for the staff of the SME’s, they can fo-
cuses more efficiently on their business,
• business productivity of the SME’s increases according to the better resolution of end-user in-
cidents,
• some of the SME’s of the cluster invest more in the IT activities than before.
3.2 Management of the cluster
All SME partners meet together – through the CCI – with the project team, on a monthly basis, to dis-
cuss the results of the past month, projects in the coming weeks and months. This monthly meeting is
a core activity in the project. This tight relation, the confidentiality of the activities and the complete
visibility on the cost (who is paying what) is a very strong point in the success of the project.
A tool is used to follow the incidents during their whole life cycle. Changes are tracked as well as as-
sets; reports on the activities are available on-line. The planning is also published so any one knows
where operates the IT team. This openness positively drives the trust among the partners.
On the same area, for all the software’s, email system and configurations, it is tended to use common
procedures in order not to reinvent the wheel with new products, therefore, to avoid new incidents and
new problems or bugs to handle.
On another hand, after sharing IT skills, sharing IT equipments has been mentioned. The issue is that
SME are not ready to have data out of their offices due to a fear of stolen or misused data. Evermore
the price of the leased lines is still very expensive and the SME’s of the cluster can’t afford such an
extra cost.
3.3 Satisfaction evaluation
A satisfaction survey is performed monthly (during the CCI) and a close relation is kept with the
Session I: Management of the failure correction process
SME’s.
Monthly, 40 questions about the quality of the intervention, the speed, the feedback, the overall satis-
faction from the users, the feeling from the IT contact in the company, the effectiveness and efficiency
in interventions are asked to the partners.
Activities are quoted “Not”, “Partially”, “Largely” and “Fully” performed. The results from the survey on
the 9 past months give an average for each 14 questions between “Largely” and “Fully”. This overall
satisfaction is very good indicator for driving the experimentation. This indicator has a direct impact on
the number of SME’s in the cluster.
4 NOEMI positioning among other solutions
The positioning of the NOEMI model regarding different way of IT exploitation on the market is made
by a SWOR analysis.
This analysis is based on experience returns within 68 SME’s contacted through different projects
managed by the Centre Henri Tudor.
Solution Strengths Weaknesses Opportunities Risks
Sourcing of the IT
activities of a SME’s
cluster to a common IT
team, with a collabora-
tive management
(NOEMI model)
Cost directly bound
with the IT staff
charges and under
control.
Priorities are man-
aged regarding
business needs.
Focus on results.
No direct depend-
ency of IT service
providers.
Issue on being
always up to date
with the new tech-
nologies.
Tooling is mandatory
and is an extra cost.
Other enterprises
resources can be
shared regarding
new business activi-
ties (manpower,
tools, equipment
sharing)
Overload: time spent
by the IT staff can’t
exceed the time
allowed for each
partner
Overcost: time effec-
tively needed for IT
activities is under the
available manpower
Sharing of a common
IT staff in an organisa-
tional structure owned
by a group of SME
(time sharing)
(Synergie project
2
Cost directly bound
with the IT staff
charges and under
control.
)
No direct depend-
ency of IT service
providers.
Issue on being
always up to date
with the new tech-
nologies.
Medium quality of
the service.
Tooling is mandatory
and can get very
expensive (mainte-
nance fees, evolu-
tion, hardware..).
Focus on means,
not on results.
Other enterprises
resources can be
shared regarding
new business activi-
ties (manpower,
tools, equipment
sharing)
Overload: time spent
by the IT staff can’t
exceed the time
allowed for each
partner
Overcost: time effec-
tively needed for IT
activities is under the
available manpower.
Buying a pool of hours
from an external IT
service supplier
Cost limited and
controlled
Strong dependen-
cies with the IT
company.
SME’s generally wait
the last minute to
call and it is often
too late or the con-
IT company not paid
regarding the quality
of its intervention but
accordingly to the
time spend to solve
the problem.
2
“Synergie“ is a project of the CRP Henri Tudor which has lead to a time-sharing of an IT person
within three companies in order to improve efficiency, cost control of their IT infrastructure and
management.
Session I: Management of the failure correction process
sequences are
worse!
No focus on result,
only on means.
Contracting with an
external IT service
supplier
Cost limited for pre-
defined activities.
Strong dependen-
cies with the IT
company.
SLA are mandatory
in order to follow the
efficiency – Penal-
ties should be added
if the service is a
core business one.
Irreversibility of the
dependency of the
supplier.
Overcost: time effec-
tively needed for IT
activities is under the
available manpower.
Lost of IT control
Hiring a part-time IT
dedicated person
Cost directly bound
with the IT staff
charges and under
control.
No direct depend-
ency of IT service
providers.
Issue on being
always up to date
with the new tech-
nologies.
Lack of employee
stability.
Quality bound with
the IT person com-
petences.
No focus on result,
only on means.
Conflicts between the
different employers of
the IT person.
Important problem
occurs while staff isn’t
present in the com-
pany.
One-person depend-
ency.
Hiring a full-time IT
dedicated person
Cost directly bound
with the IT staff
charges and under
control.
No direct depend-
ency of IT service
providers.
Issue on being
always up to date
with the new tech-
nologies.
The staff is not
enough exploited.
Most of the SME’s
can’t afford such a
full time IT people.
Overcost: time
effectively needed
for IT activities is
under the available
manpower.
Possibility to de-
velop new business
activities based on
IT innovation.
Job not enough
attracting for It staff.
One-person depend-
ency.
Overcost: time effec-
tively needed for IT
activities is under the
available manpower
Hiring an IT dedicated
person for IT manage-
ment and for an other
activity
Cost directly bound
with the IT staff
charges and under
control.
No IT company
involved, no de-
pendency
Issue on being
always up to date
with the new tech-
nologies.
Quality depending
on the time assigned
to the different activi-
ties
No focus on result,
only on means.
Depending of the
staff, doing two differ-
ent jobs can be inter-
esting or difficult to
manage.
One-person depend-
ency.
The more significant differences between the NOEMI model and the other solutions rely on:
• the financial aspects,
• the openness of the activity performance,
• the focus on results.
The sourcing approach and the defined financial rules of the NOEMI model links the objectives and
the motivation of the clients (the SME’s) and the supplier (the operational team), whereas other solu-
tions propose a time-based charging.
Session I: Management of the failure correction process
5 Status on the development and perspectives
The NOEMI project leads nowadays to an 8 partners cluster.
The project under the cover of the Centre Henri Tudor reaches its end and is ready to be transferred
to the market. The model has been estimated as a success by the SME’s participating in the project;
they have decided to go on with the initiative. So, it is time for the SME cluster to choose their way for
the future of their IT-sourcing service.
Many solutions are possible amongst which the transfer to an IT service company, the creation of a
dedicated common company, the creation of a spin-off, employment of the IT staff with a back charg-
ing.
A call for tender aiming to take over the “NOEMI cluster #1” operational activities is being written and
not less than 12 large or medium IT companies have shown their interest to be involved in the mailing
for the call for tender.
The success of the model will be directly related to its appropriation by the market. Some indicators to
measure it could be:
• the number of partners still working together in the horizon 2006,
• the number of new clusters created through IT companies or through a GIE (Economic group-
ing from the companies),
• the number of IT companies interested in the NOEMI label we work on (model requirements to
respect…) and the annual renewing of the label,
• the satisfaction survey performed regularly in the clusters,
• the number of amendments to the model.
Session I: Management of the failure correction process
6 Literature
[1] Di Renzo B., Feltus C., Development and experimentation of a model of IT collaborative management for use
in SME, in: Proceedings of the International Conference AIM 2003, Grenoble, France, 2003
[2] ISO/IEC JTC 1/SC7, ISO/IEC TR 15504, 1998
[3] IT Infrastructure Library – Service Support, Office of Government Commerce, United Kingdom, 2000 – 2002
[4] IT Infrastructure Library – Service Delivery, Office of Government Commerce, United Kingdom, 2000 – 2002
[5] IT Infrastructure Library – ICT Infrastructure Management, Office of Government Commerce, United Kingdom,
2000 – 2002
[6] IT Infrastructure Library – Security management, Office of Government Commerce, United Kingdom, 2002
[7] Di Renzo B., Feltus C., Process assessment for use in very small enterprise: the NOEMI assessment
methodology, in: Proceedings of the International Conference Eurospi 2003, Graz, Austria, 2003.
[8] IT Infrastructure Library – Practices in small IT unit, Central Computer and Telecommunication Agency, 1995.
[9] Robert S. Kaplan and David P.Norton, The Balanced Scorecard – Translating Strategy into Action, 1996.
Session I: Management of the failure correction process
7 Author CVs
Bernard DI RENZO
Bernard Di Renzo graduated as a “Civil Engineer” in electronics and computer science from
the University of Liege (Belgium) in 1989. He first worked as a project engineer in the engi-
neering company of an international industry group. There he managed several projects re-
lated to the IT discipline. From 1993 to 1999, he was the head of the IT-affiliate of a banking
group in Luxembourg. In this function he developed an accurate focus on quality service pro-
vision. Then he joined an international clearinghouse for wireless operators as the Head of
Worldwide Client Support. Since 2001, he has worked in the CITI (Centre d’Innovation par les
Technologies de l’Information) department of the Centre de Recherche Public Henri Tudor
(Luxembourg). He has managed several projects related to quality in the IT discipline with a
special focus on process assessment and improvement, security management, risk manage-
ment, IT clustering… He is a SPICE Qualified Assessor, ITIL Foundation Certified, and Quality
System Auditor certified. He is the coordinator of two project portfolios related to IT quality and
certification and to IT security. He also the head of a research unit related to process assess-
ment and improvement, service management, operational risk management, IT-business
alignment, and new organisation framing.
Christophe FELTUS
Christophe Feltus is graduated as an Electromechanics Engineer from the “Institut Supérieur
Industriel des Art et Métiers Pierrard in Virton, Belgium. He worked for several years in private
companies as: Production Head at Pfizer SA in Jette, Belgium, Project Coordinator at Nizet
Entreprise in Louvain-la-Neuve, Belgium, and Assessor for the Civil Belgium Aviation Admini-
stration in Brussels, Belgium. He joined the Centre de Recherche Public Henri Tudor in the
Grand-Duchy of Luxembourg in 1999 to work in the Centre d’Innovation par les Technologies
de l’Information (CITI). There he has taken part in a project called Prisme Tremplin for the ac-
companiment of SMEs towards the information society. In 2002, he integrated the project
Noemi (Nouvelles Organisation de l’exploitation et de la Maintenance Informatiques) as As-
sessor and he now leads projects IT Cluster and SecurePME.
Sylvie PRIME
Sylvie Prime is graduated as an IT Engineer from The university of Nancy II, France. After a
year of development for a pharmaceutical group, Sylvie began to work in Luxembourg in 1995
at the EIB, then at RTL Group in charge of the IT production, sites abroad included. She be-
gan to work on organization of IT Teams when she joined Arthur Andersen in 1999 and, even
deeper when working at Quint Wellington Redwood. She then passed the ITIL foundation
exam, the Service Manager one. She has been a Service Management consultant for 2 years
and joined the CRP Henri Tudor in 2003 to develop the Service Management activities (ITIL,
training, IT Service Management Forum). Sylvie is also SPICE Assessor.

Mais conteúdo relacionado

Mais procurados

Iee one day workshop handout material, romania 5-9-13 [compatibility mode] (1)
Iee one day workshop handout  material, romania 5-9-13 [compatibility mode] (1)Iee one day workshop handout  material, romania 5-9-13 [compatibility mode] (1)
Iee one day workshop handout material, romania 5-9-13 [compatibility mode] (1)Adela Marin
 
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...ijait
 
The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
 
MIS 04 Management of Business
MIS 04  Management of BusinessMIS 04  Management of Business
MIS 04 Management of BusinessTushar B Kute
 
Business Process Management and Information Technology
Business Process Management and Information TechnologyBusiness Process Management and Information Technology
Business Process Management and Information TechnologyAshish Desai
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2adrenal
 
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES ijwscjournal
 
IT in BUSINESS
IT in BUSINESSIT in BUSINESS
IT in BUSINESSLibcorpio
 
The Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp SoftwareThe Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp SoftwareDonovan Mulder
 
Management Information System James O Brien Study Notes
Management Information System James O Brien Study NotesManagement Information System James O Brien Study Notes
Management Information System James O Brien Study Notessau275
 
Impact of IT & strategic issue of IT
Impact of IT & strategic issue of ITImpact of IT & strategic issue of IT
Impact of IT & strategic issue of ITShubham Upadhyay
 
8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger WhitepaperXledger UK
 
intro to maint management systems
intro to maint management systemsintro to maint management systems
intro to maint management systemsBill Sheppard
 
Elements of system ppt
Elements of system pptElements of system ppt
Elements of system pptkunal kishore
 
Session#2; competing with information systems
Session#2; competing with information systemsSession#2; competing with information systems
Session#2; competing with information systemsOmid Aminzadeh Gohari
 

Mais procurados (18)

Iee one day workshop handout material, romania 5-9-13 [compatibility mode] (1)
Iee one day workshop handout  material, romania 5-9-13 [compatibility mode] (1)Iee one day workshop handout  material, romania 5-9-13 [compatibility mode] (1)
Iee one day workshop handout material, romania 5-9-13 [compatibility mode] (1)
 
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...
 
M is lecture6_final
M is lecture6_finalM is lecture6_final
M is lecture6_final
 
The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...
 
MIS 04 Management of Business
MIS 04  Management of BusinessMIS 04  Management of Business
MIS 04 Management of Business
 
Business Process Management and Information Technology
Business Process Management and Information TechnologyBusiness Process Management and Information Technology
Business Process Management and Information Technology
 
Mis chapter 8
Mis chapter 8Mis chapter 8
Mis chapter 8
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2
 
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES
 
IT in BUSINESS
IT in BUSINESSIT in BUSINESS
IT in BUSINESS
 
The Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp SoftwareThe Hidden Financial Costs Of Erp Software
The Hidden Financial Costs Of Erp Software
 
Management Information System James O Brien Study Notes
Management Information System James O Brien Study NotesManagement Information System James O Brien Study Notes
Management Information System James O Brien Study Notes
 
Impact of IT & strategic issue of IT
Impact of IT & strategic issue of ITImpact of IT & strategic issue of IT
Impact of IT & strategic issue of IT
 
8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper8 steps to Successful Accounts System Selection - Xledger Whitepaper
8 steps to Successful Accounts System Selection - Xledger Whitepaper
 
intro to maint management systems
intro to maint management systemsintro to maint management systems
intro to maint management systems
 
Elements of system ppt
Elements of system pptElements of system ppt
Elements of system ppt
 
Sad
SadSad
Sad
 
Session#2; competing with information systems
Session#2; competing with information systemsSession#2; competing with information systems
Session#2; competing with information systems
 

Destaque

Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...christophefeltus
 
Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logicchristophefeltus
 
Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...christophefeltus
 
Toward systemic risk management in the frame of business service ecosystem
Toward systemic risk management in the frame of business service ecosystem Toward systemic risk management in the frame of business service ecosystem
Toward systemic risk management in the frame of business service ecosystem christophefeltus
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...christophefeltus
 
Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...christophefeltus
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languagechristophefeltus
 
If only i can trust my police! sim an agent based audit solution of access ri...
If only i can trust my police! sim an agent based audit solution of access ri...If only i can trust my police! sim an agent based audit solution of access ri...
If only i can trust my police! sim an agent based audit solution of access ri...christophefeltus
 
Methodology to align business and it policies use case from an it company
Methodology to align business and it policies   use case from an it companyMethodology to align business and it policies   use case from an it company
Methodology to align business and it policies use case from an it companychristophefeltus
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...christophefeltus
 
Collaborative development of open source e learning platforms
Collaborative development of open source e learning platformsCollaborative development of open source e learning platforms
Collaborative development of open source e learning platformschristophefeltus
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecturechristophefeltus
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...christophefeltus
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...christophefeltus
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...christophefeltus
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodschristophefeltus
 
Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...christophefeltus
 
Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...christophefeltus
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...christophefeltus
 

Destaque (19)

Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...
 
Building a responsibility model using modal logic
Building a responsibility model using modal logicBuilding a responsibility model using modal logic
Building a responsibility model using modal logic
 
Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...Re mola responsibility model language to align access rights with business pr...
Re mola responsibility model language to align access rights with business pr...
 
Toward systemic risk management in the frame of business service ecosystem
Toward systemic risk management in the frame of business service ecosystem Toward systemic risk management in the frame of business service ecosystem
Toward systemic risk management in the frame of business service ecosystem
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...Enhancing the archmate® standard with a responsibility modeling language for ...
Enhancing the archmate® standard with a responsibility modeling language for ...
 
Modeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate languageModeling enterprise risk management and secutity with the archi mate language
Modeling enterprise risk management and secutity with the archi mate language
 
If only i can trust my police! sim an agent based audit solution of access ri...
If only i can trust my police! sim an agent based audit solution of access ri...If only i can trust my police! sim an agent based audit solution of access ri...
If only i can trust my police! sim an agent based audit solution of access ri...
 
Methodology to align business and it policies use case from an it company
Methodology to align business and it policies   use case from an it companyMethodology to align business and it policies   use case from an it company
Methodology to align business and it policies use case from an it company
 
Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...
 
Collaborative development of open source e learning platforms
Collaborative development of open source e learning platformsCollaborative development of open source e learning platforms
Collaborative development of open source e learning platforms
 
Conceptual trusted incident reaction architecture
Conceptual trusted incident reaction architectureConceptual trusted incident reaction architecture
Conceptual trusted incident reaction architecture
 
Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...Enterprise architecture enhanced with responsibility to manage access rights ...
Enterprise architecture enhanced with responsibility to manage access rights ...
 
Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...Building a responsibility model including accountability capability and commi...
Building a responsibility model including accountability capability and commi...
 
Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...Towards a hl7 based metamodeling integration approach for embracing the priva...
Towards a hl7 based metamodeling integration approach for embracing the priva...
 
Preliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methodsPreliminary literature review of policy engineering methods
Preliminary literature review of policy engineering methods
 
Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...Enhancement of business it alignment by including responsibility components i...
Enhancement of business it alignment by including responsibility components i...
 
Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...Improving operational risk management systems by formalizing the basel ii reg...
Improving operational risk management systems by formalizing the basel ii reg...
 
Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...Strengthening employee’s responsibility to enhance governance of it – cobit r...
Strengthening employee’s responsibility to enhance governance of it – cobit r...
 

Semelhante a Noemi, a collaborative management for ict process improvement in sme experience report

Deficiency in it controls 2017
Deficiency in it controls 2017Deficiency in it controls 2017
Deficiency in it controls 2017John Gardner, CMC
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkIJCSIS Research Publications
 
Week 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docx
Week 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docxWeek 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docx
Week 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docxjessiehampson
 
The moving force behind IT decisions are variable as to what context.pdf
The moving force behind IT decisions are variable as to what context.pdfThe moving force behind IT decisions are variable as to what context.pdf
The moving force behind IT decisions are variable as to what context.pdfsanjeevtandonsre
 
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...Nancy Ideker
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Managementjiricejka
 
Technology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT CostsTechnology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT CostsCognizant
 
Business Analysis using Machine Learning
Business Analysis using Machine LearningBusiness Analysis using Machine Learning
Business Analysis using Machine LearningIRJET Journal
 
Fool With A Tool V2
Fool With A Tool V2Fool With A Tool V2
Fool With A Tool V2Linz1769
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
 
How an integrated management system (IMS) helps companies to remain competitive
How an integrated management system (IMS) helps companies to remain competitive How an integrated management system (IMS) helps companies to remain competitive
How an integrated management system (IMS) helps companies to remain competitive Etienne Venter
 
Strategic Cost Optimization: Driving Business Innovation While Reducing IT Costs
Strategic Cost Optimization: Driving Business Innovation While Reducing IT CostsStrategic Cost Optimization: Driving Business Innovation While Reducing IT Costs
Strategic Cost Optimization: Driving Business Innovation While Reducing IT CostsCognizant
 

Semelhante a Noemi, a collaborative management for ict process improvement in sme experience report (20)

Deficiency in it controls 2017
Deficiency in it controls 2017Deficiency in it controls 2017
Deficiency in it controls 2017
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise IT
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
Week 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docx
Week 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docxWeek 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docx
Week 3 LessonIT SHARED SERVICESIT SHARED SERVICES – OVERVIEW.docx
 
The moving force behind IT decisions are variable as to what context.pdf
The moving force behind IT decisions are variable as to what context.pdfThe moving force behind IT decisions are variable as to what context.pdf
The moving force behind IT decisions are variable as to what context.pdf
 
N18030594102
N18030594102N18030594102
N18030594102
 
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
 
CMMi & IT Governance
CMMi & IT GovernanceCMMi & IT Governance
CMMi & IT Governance
 
Understanding IT Governance and Risk Management
Understanding IT Governance and Risk ManagementUnderstanding IT Governance and Risk Management
Understanding IT Governance and Risk Management
 
Technology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT CostsTechnology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
Technology Cost Management 4D Framework: A Smarter Way to Manage IT Costs
 
Business Analysis using Machine Learning
Business Analysis using Machine LearningBusiness Analysis using Machine Learning
Business Analysis using Machine Learning
 
Fool With A Tool V2
Fool With A Tool V2Fool With A Tool V2
Fool With A Tool V2
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 
How an integrated management system (IMS) helps companies to remain competitive
How an integrated management system (IMS) helps companies to remain competitive How an integrated management system (IMS) helps companies to remain competitive
How an integrated management system (IMS) helps companies to remain competitive
 
Parag Bhagat - The Management Accountant - Oct 2015
Parag Bhagat - The Management Accountant - Oct 2015Parag Bhagat - The Management Accountant - Oct 2015
Parag Bhagat - The Management Accountant - Oct 2015
 
Optimize Change Management
Optimize Change ManagementOptimize Change Management
Optimize Change Management
 
026655 ocr
026655 ocr026655 ocr
026655 ocr
 
BCSITv3.1
BCSITv3.1BCSITv3.1
BCSITv3.1
 
14.balanced scorecard-case-study
14.balanced scorecard-case-study14.balanced scorecard-case-study
14.balanced scorecard-case-study
 
Strategic Cost Optimization: Driving Business Innovation While Reducing IT Costs
Strategic Cost Optimization: Driving Business Innovation While Reducing IT CostsStrategic Cost Optimization: Driving Business Innovation While Reducing IT Costs
Strategic Cost Optimization: Driving Business Innovation While Reducing IT Costs
 

Mais de christophefeltus

Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementchristophefeltus
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...christophefeltus
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e businesschristophefeltus
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
Industry program panel - SINCONF ACM
Industry program panel - SINCONF ACMIndustry program panel - SINCONF ACM
Industry program panel - SINCONF ACMchristophefeltus
 
Financial critical infrastructure a mas trusted architecture for alert detect...
Financial critical infrastructure a mas trusted architecture for alert detect...Financial critical infrastructure a mas trusted architecture for alert detect...
Financial critical infrastructure a mas trusted architecture for alert detect...christophefeltus
 
Evaluation de la qualité des processus informatiques en petites et moyennes e...
Evaluation de la qualité des processus informatiques en petites et moyennes e...Evaluation de la qualité des processus informatiques en petites et moyennes e...
Evaluation de la qualité des processus informatiques en petites et moyennes e...christophefeltus
 
Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...christophefeltus
 
Conceptual integration of enterprise architecture management and security ris...
Conceptual integration of enterprise architecture management and security ris...Conceptual integration of enterprise architecture management and security ris...
Conceptual integration of enterprise architecture management and security ris...christophefeltus
 
An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...christophefeltus
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...christophefeltus
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkchristophefeltus
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...christophefeltus
 

Mais de christophefeltus (13)

Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...Process assessment for use in very small enterprises the noemi assessment met...
Process assessment for use in very small enterprises the noemi assessment met...
 
Open sst based clearing mechanism for e business
Open sst based clearing mechanism for e businessOpen sst based clearing mechanism for e business
Open sst based clearing mechanism for e business
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Industry program panel - SINCONF ACM
Industry program panel - SINCONF ACMIndustry program panel - SINCONF ACM
Industry program panel - SINCONF ACM
 
Financial critical infrastructure a mas trusted architecture for alert detect...
Financial critical infrastructure a mas trusted architecture for alert detect...Financial critical infrastructure a mas trusted architecture for alert detect...
Financial critical infrastructure a mas trusted architecture for alert detect...
 
Evaluation de la qualité des processus informatiques en petites et moyennes e...
Evaluation de la qualité des processus informatiques en petites et moyennes e...Evaluation de la qualité des processus informatiques en petites et moyennes e...
Evaluation de la qualité des processus informatiques en petites et moyennes e...
 
Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...Développement et expérimentation d’un modèle de gestion collaborative des pra...
Développement et expérimentation d’un modèle de gestion collaborative des pra...
 
Conceptual integration of enterprise architecture management and security ris...
Conceptual integration of enterprise architecture management and security ris...Conceptual integration of enterprise architecture management and security ris...
Conceptual integration of enterprise architecture management and security ris...
 
An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...An ontology for requirements analysis of managers’ policies in financial inst...
An ontology for requirements analysis of managers’ policies in financial inst...
 
An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...An agent based framework for identity management the unsuspected relation wit...
An agent based framework for identity management the unsuspected relation wit...
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
 

Último

❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...chandars293
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .Poonam Aher Patil
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Silpa
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)AkefAfaneh2
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)Areesha Ahmad
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticssakshisoni2385
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryAlex Henderson
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicinesherlingomez2
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxBhagirath Gogikar
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Servicemonikaservice1
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformationAreesha Ahmad
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Mohammad Khajehpour
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)Areesha Ahmad
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfrohankumarsinghrore1
 
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONrouseeyyy
 

Último (20)

❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptx
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
 

Noemi, a collaborative management for ict process improvement in sme experience report

  • 1. Abstract This paper relates to an R&D project – called NOEMI 1 The model developed in the project focuses on the usual IT activities of the SME’s, which are classified in five domains: infrastructure, support, management, security, and documentation. The NOEMI model has been successfully experimented with PME partners for validation pur- pose. – aiming to propose to SME’s a col- laborative management of their respective information systems in terms of quality, reliability and cost. The targeted SME are those without IT dedicated internal staff. This paper insists on the experimentation of the NOEMI model. The results are discussed and compared with other classical solutions usually encountered within IT practices of SME’s. The last part of the paper draws the perspectives opened with the model according to the results of its experimentation. Keywords IT Service Management, collaborative management, SME, process assessment, process im- provement. 1 Nouvelle Organisation de la Maitenance et de l’Exploitation Informatiques NOEMI, a collaborative management for ICT process improvement in SME: experience report Bernard DI RENZO, Christophe FELTUS, Sylvie PRIME
  • 2. Session I: Management of the failure correction process 1 Introduction It sounds obvious that SME’s competitiveness is more and more linked to the quality and the reliability of their information systems. Nevertheless hiring an IT dedicated staff is often discouraged due to the small size of the IT infrastructure of the SME’s. The NOEMI project addresses this critical issue for the SME’s and has developed a relevant solution to bridge the gap between the mandatory need of quality in IT infrastructure of the SME’s and the dramatic lack of internal skills. The solution is based on the creation of clusters of SME’s aiming to increase IT infrastructure volume. The global IT activities within the clusters is then manageable in a collaborative way, which can lead to higher quality and reliability as larger IT departments would provide. This paper reviews briefly the NOEMI collaborative model developed by the Centre Henri Tudor, its validation by a case study, its positioning regarding alternative solutions and at last, as conclusion and perspective, the transfer of the research results to the market. 2 The NOEMI model The NOEMI model relies on partners, gathered in clusters. A common dedicated operational team performs their IT activities and is managed on a regular basis by an IT Coordination Committee (the CCI). Figure 1 illustrates the organisational frame of the model. This chapter explains the references used to create the model, the openness of the cluster and its manage- ment. 2.1 The baseline and the refer- ences The NOEMI model is built on 5 areas: 1. Management, 2. Service Support, 3. Infrastructure, 4. Security, 5. Documentation. These five areas include 20 processes tailored for use a SME environment [1]. For each area, a set of activities are defined, performed by the operational team and controlled by the CCI. Development has been partially inspired by ISO/IEC TR 15504 [2] and ITIL [3, 4, 5 and 6]. 2.2 Constitution of SME’s clusters The NOEMI model allows the increase or decrease of the number of SME partners in a cluster. Before a new SME joins the cluster, a capability profile of each area is defined according to a specific as- Figure 1: Organisational frame of the NOEMI model
  • 3. Session I: Management of the failure correction process sessment method developed in the NOEMI project [7]. The NOEMI assessment method is directly inspired by ISO/IEC TR 15504 [2]. This assessment analyses in depth the weaknesses and the strengths of the 20 processes defined in the model and defines a capability profile of the 5 domains. A list of pragmatic improvement actions to take according to urgency and impact is proposed. The results of the assessment are used as a reference for the IT operational team for the first steps when the new SME is entering the cluster. 2.3 Evolution of the IT Infrastructure Following the recommendations, a lot of changes and manpower are required to imple- ment the most urgent and important activities. This phase, called “Up To Date Phase” will take from 6 to 9 months. The stabilization phase will then start. It is to notice that, in this phase, the number of incidents will decrease in opposition with the number of requests, which will get higher. Figure 2 illustrates the main phases in the model implementation. 2.4 Management of the SME Clusters After assessment and depending on the improvement actions agreed with the SME, the operational team will handle all activities and the 20 defined processes. A particular focus is put on incident man- agement, change management and configuration management assumed as the most critical IT proc- esses in SME’s [8]. The operational team provides manpower for the activities needed to improve the capability level of each area. The size of the team is linked to the global IT infrastructure of the cluster and includes both technical staff and project leader. Team members are qualified (IT or project management), can act autonomously, and have strong relationship skills. The operational team is managed the CCI where a representative manager from each SME stands. The main objectives of this committee is to ensure: • the coherence between the cluster and the own objectives and strategy of each SME, • the convergence of IT improvements, • the evaluation of preventive and corrective actions. The committee bases its management action on a balanced set of indicators within financial, partner’s satisfaction, activity efficiency, and people skills [9]. Moreover, the capability profile of each SME is followed up on the basis of the assessment and re- viewed on a regular basis (6-12 months). Figure 2: Implementation phases of the NOEMI model
  • 4. Session I: Management of the failure correction process 3 Case study and validation The model NOEMI, as shortly described above, has been validated through a case study. This chapter focuses on this experimental validation according to three perspectives: economic health of the ex- perimental cluster, its management and the satisfaction of the SME’s of the cluster. 3.1 Economic health of the cluster The financial management of the IT activities within the cluster is based on the balance between the costs and the charges. The total cost is the sum of the IT staff charges, travel costs of the IT staff, training, equipments (laptop, mobiles, etc.), and miscellaneous charges (phone call, Internet access, etc.) In the case study, no benefit is down because the cluster is the ownership of the SME. This total cost is transparently financed by each SME of the cluster and is apportioned to their IT infra- structure, according to an empirical calculation. Each server has a 10 points value, each PCs has a 1 point value on which 20 points are added to enter the project. The point represents a certain financial value. With this simple and clear calculation, the SME’s know exactly how much their IT service will cost on a monthly basis and on an annual basis. Here under, the main advantages related to the eco- nomic health of the cluster: • budgeting becomes very easy, • hardware and software investment gets also easier as the inventory helps efficiently in making the decision, • the workload related to IT activities has been reduced for the staff of the SME’s, they can fo- cuses more efficiently on their business, • business productivity of the SME’s increases according to the better resolution of end-user in- cidents, • some of the SME’s of the cluster invest more in the IT activities than before. 3.2 Management of the cluster All SME partners meet together – through the CCI – with the project team, on a monthly basis, to dis- cuss the results of the past month, projects in the coming weeks and months. This monthly meeting is a core activity in the project. This tight relation, the confidentiality of the activities and the complete visibility on the cost (who is paying what) is a very strong point in the success of the project. A tool is used to follow the incidents during their whole life cycle. Changes are tracked as well as as- sets; reports on the activities are available on-line. The planning is also published so any one knows where operates the IT team. This openness positively drives the trust among the partners. On the same area, for all the software’s, email system and configurations, it is tended to use common procedures in order not to reinvent the wheel with new products, therefore, to avoid new incidents and new problems or bugs to handle. On another hand, after sharing IT skills, sharing IT equipments has been mentioned. The issue is that SME are not ready to have data out of their offices due to a fear of stolen or misused data. Evermore the price of the leased lines is still very expensive and the SME’s of the cluster can’t afford such an extra cost. 3.3 Satisfaction evaluation A satisfaction survey is performed monthly (during the CCI) and a close relation is kept with the
  • 5. Session I: Management of the failure correction process SME’s. Monthly, 40 questions about the quality of the intervention, the speed, the feedback, the overall satis- faction from the users, the feeling from the IT contact in the company, the effectiveness and efficiency in interventions are asked to the partners. Activities are quoted “Not”, “Partially”, “Largely” and “Fully” performed. The results from the survey on the 9 past months give an average for each 14 questions between “Largely” and “Fully”. This overall satisfaction is very good indicator for driving the experimentation. This indicator has a direct impact on the number of SME’s in the cluster. 4 NOEMI positioning among other solutions The positioning of the NOEMI model regarding different way of IT exploitation on the market is made by a SWOR analysis. This analysis is based on experience returns within 68 SME’s contacted through different projects managed by the Centre Henri Tudor. Solution Strengths Weaknesses Opportunities Risks Sourcing of the IT activities of a SME’s cluster to a common IT team, with a collabora- tive management (NOEMI model) Cost directly bound with the IT staff charges and under control. Priorities are man- aged regarding business needs. Focus on results. No direct depend- ency of IT service providers. Issue on being always up to date with the new tech- nologies. Tooling is mandatory and is an extra cost. Other enterprises resources can be shared regarding new business activi- ties (manpower, tools, equipment sharing) Overload: time spent by the IT staff can’t exceed the time allowed for each partner Overcost: time effec- tively needed for IT activities is under the available manpower Sharing of a common IT staff in an organisa- tional structure owned by a group of SME (time sharing) (Synergie project 2 Cost directly bound with the IT staff charges and under control. ) No direct depend- ency of IT service providers. Issue on being always up to date with the new tech- nologies. Medium quality of the service. Tooling is mandatory and can get very expensive (mainte- nance fees, evolu- tion, hardware..). Focus on means, not on results. Other enterprises resources can be shared regarding new business activi- ties (manpower, tools, equipment sharing) Overload: time spent by the IT staff can’t exceed the time allowed for each partner Overcost: time effec- tively needed for IT activities is under the available manpower. Buying a pool of hours from an external IT service supplier Cost limited and controlled Strong dependen- cies with the IT company. SME’s generally wait the last minute to call and it is often too late or the con- IT company not paid regarding the quality of its intervention but accordingly to the time spend to solve the problem. 2 “Synergie“ is a project of the CRP Henri Tudor which has lead to a time-sharing of an IT person within three companies in order to improve efficiency, cost control of their IT infrastructure and management.
  • 6. Session I: Management of the failure correction process sequences are worse! No focus on result, only on means. Contracting with an external IT service supplier Cost limited for pre- defined activities. Strong dependen- cies with the IT company. SLA are mandatory in order to follow the efficiency – Penal- ties should be added if the service is a core business one. Irreversibility of the dependency of the supplier. Overcost: time effec- tively needed for IT activities is under the available manpower. Lost of IT control Hiring a part-time IT dedicated person Cost directly bound with the IT staff charges and under control. No direct depend- ency of IT service providers. Issue on being always up to date with the new tech- nologies. Lack of employee stability. Quality bound with the IT person com- petences. No focus on result, only on means. Conflicts between the different employers of the IT person. Important problem occurs while staff isn’t present in the com- pany. One-person depend- ency. Hiring a full-time IT dedicated person Cost directly bound with the IT staff charges and under control. No direct depend- ency of IT service providers. Issue on being always up to date with the new tech- nologies. The staff is not enough exploited. Most of the SME’s can’t afford such a full time IT people. Overcost: time effectively needed for IT activities is under the available manpower. Possibility to de- velop new business activities based on IT innovation. Job not enough attracting for It staff. One-person depend- ency. Overcost: time effec- tively needed for IT activities is under the available manpower Hiring an IT dedicated person for IT manage- ment and for an other activity Cost directly bound with the IT staff charges and under control. No IT company involved, no de- pendency Issue on being always up to date with the new tech- nologies. Quality depending on the time assigned to the different activi- ties No focus on result, only on means. Depending of the staff, doing two differ- ent jobs can be inter- esting or difficult to manage. One-person depend- ency. The more significant differences between the NOEMI model and the other solutions rely on: • the financial aspects, • the openness of the activity performance, • the focus on results. The sourcing approach and the defined financial rules of the NOEMI model links the objectives and the motivation of the clients (the SME’s) and the supplier (the operational team), whereas other solu- tions propose a time-based charging.
  • 7. Session I: Management of the failure correction process 5 Status on the development and perspectives The NOEMI project leads nowadays to an 8 partners cluster. The project under the cover of the Centre Henri Tudor reaches its end and is ready to be transferred to the market. The model has been estimated as a success by the SME’s participating in the project; they have decided to go on with the initiative. So, it is time for the SME cluster to choose their way for the future of their IT-sourcing service. Many solutions are possible amongst which the transfer to an IT service company, the creation of a dedicated common company, the creation of a spin-off, employment of the IT staff with a back charg- ing. A call for tender aiming to take over the “NOEMI cluster #1” operational activities is being written and not less than 12 large or medium IT companies have shown their interest to be involved in the mailing for the call for tender. The success of the model will be directly related to its appropriation by the market. Some indicators to measure it could be: • the number of partners still working together in the horizon 2006, • the number of new clusters created through IT companies or through a GIE (Economic group- ing from the companies), • the number of IT companies interested in the NOEMI label we work on (model requirements to respect…) and the annual renewing of the label, • the satisfaction survey performed regularly in the clusters, • the number of amendments to the model.
  • 8. Session I: Management of the failure correction process 6 Literature [1] Di Renzo B., Feltus C., Development and experimentation of a model of IT collaborative management for use in SME, in: Proceedings of the International Conference AIM 2003, Grenoble, France, 2003 [2] ISO/IEC JTC 1/SC7, ISO/IEC TR 15504, 1998 [3] IT Infrastructure Library – Service Support, Office of Government Commerce, United Kingdom, 2000 – 2002 [4] IT Infrastructure Library – Service Delivery, Office of Government Commerce, United Kingdom, 2000 – 2002 [5] IT Infrastructure Library – ICT Infrastructure Management, Office of Government Commerce, United Kingdom, 2000 – 2002 [6] IT Infrastructure Library – Security management, Office of Government Commerce, United Kingdom, 2002 [7] Di Renzo B., Feltus C., Process assessment for use in very small enterprise: the NOEMI assessment methodology, in: Proceedings of the International Conference Eurospi 2003, Graz, Austria, 2003. [8] IT Infrastructure Library – Practices in small IT unit, Central Computer and Telecommunication Agency, 1995. [9] Robert S. Kaplan and David P.Norton, The Balanced Scorecard – Translating Strategy into Action, 1996.
  • 9. Session I: Management of the failure correction process 7 Author CVs Bernard DI RENZO Bernard Di Renzo graduated as a “Civil Engineer” in electronics and computer science from the University of Liege (Belgium) in 1989. He first worked as a project engineer in the engi- neering company of an international industry group. There he managed several projects re- lated to the IT discipline. From 1993 to 1999, he was the head of the IT-affiliate of a banking group in Luxembourg. In this function he developed an accurate focus on quality service pro- vision. Then he joined an international clearinghouse for wireless operators as the Head of Worldwide Client Support. Since 2001, he has worked in the CITI (Centre d’Innovation par les Technologies de l’Information) department of the Centre de Recherche Public Henri Tudor (Luxembourg). He has managed several projects related to quality in the IT discipline with a special focus on process assessment and improvement, security management, risk manage- ment, IT clustering… He is a SPICE Qualified Assessor, ITIL Foundation Certified, and Quality System Auditor certified. He is the coordinator of two project portfolios related to IT quality and certification and to IT security. He also the head of a research unit related to process assess- ment and improvement, service management, operational risk management, IT-business alignment, and new organisation framing. Christophe FELTUS Christophe Feltus is graduated as an Electromechanics Engineer from the “Institut Supérieur Industriel des Art et Métiers Pierrard in Virton, Belgium. He worked for several years in private companies as: Production Head at Pfizer SA in Jette, Belgium, Project Coordinator at Nizet Entreprise in Louvain-la-Neuve, Belgium, and Assessor for the Civil Belgium Aviation Admini- stration in Brussels, Belgium. He joined the Centre de Recherche Public Henri Tudor in the Grand-Duchy of Luxembourg in 1999 to work in the Centre d’Innovation par les Technologies de l’Information (CITI). There he has taken part in a project called Prisme Tremplin for the ac- companiment of SMEs towards the information society. In 2002, he integrated the project Noemi (Nouvelles Organisation de l’exploitation et de la Maintenance Informatiques) as As- sessor and he now leads projects IT Cluster and SecurePME. Sylvie PRIME Sylvie Prime is graduated as an IT Engineer from The university of Nancy II, France. After a year of development for a pharmaceutical group, Sylvie began to work in Luxembourg in 1995 at the EIB, then at RTL Group in charge of the IT production, sites abroad included. She be- gan to work on organization of IT Teams when she joined Arthur Andersen in 1999 and, even deeper when working at Quint Wellington Redwood. She then passed the ITIL foundation exam, the Service Manager one. She has been a Service Management consultant for 2 years and joined the CRP Henri Tudor in 2003 to develop the Service Management activities (ITIL, training, IT Service Management Forum). Sylvie is also SPICE Assessor.