Proactive IT Incident Prevention: Using Data Analytics to Reduce Service Interruptions

Proactive IT Incident Prevention: Using Data Analytics to Reduce Service Interruptions by Mark Gregory Malley MS, Drexel University, 2011 BS, Drexel University, 2003 Doctoral Study Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Business Administration

[1]  Mark Burdon,et al.  Re-conceptualising privacy and discrimination in an age of talent analytics , 2014 .

[2]  Tom Fawcett,et al.  Data Science and its Relationship to Big Data and Data-Driven Decision Making , 2013, Big Data.

[3]  Marc Applebaum Phenomenological Psychological Research as Science , 2012 .

[4]  H. Ferdowsian,et al.  Human and Animal Research Guidelines: Aligning Ethical Constructs with New Scientific Developments , 2011, Bioethics.

[5]  Stephen Chong,et al.  Self-Identifying Data for Fair Use , 2015, JDIQ.

[6]  Jonna Järveläinen,et al.  IT incidents and business impacts: Validating a framework for continuity management in information systems , 2013, Int. J. Inf. Manag..

[7]  Pedro M. Domingos A few useful things to know about machine learning , 2012, Commun. ACM.

[8]  Harry Katzan,et al.  Foundations Of Service Science Management And Business , 2008 .

[9]  Namhun Kim,et al.  Performance assessment in an interactive call center workforce simulation , 2011, Simul. Model. Pract. Theory.

[10]  J. Pallant SPSS survival manual : a step-by-step guide to data analysis using SPSS version 15 , 2007 .

[11]  Syeda Farha Shazmeen,et al.  Performance Evaluation of Different Data Mining Classification Algorithm and Predictive Analysis , 2013 .

[12]  Jennifer Neville,et al.  Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems , 2012, NSDI.

[13]  Jongwoo Kim,et al.  Incident-centered information security: Managing a strategic balance between prevention and response , 2014, Inf. Manag..

[14]  T. Salthouse All data collection and analysis methods have limitations: reply to Rabbitt (2011) and Raz and Lindenberger (2011). , 2011, Psychological bulletin.

[15]  G. D. Sardana,et al.  A case study of service desk's performance measurement system , 2012 .

[16]  Martin Kornberger,et al.  The visible hand and the crowd: Analyzing organization design in distributed innovation systems , 2017 .

[17]  Prasanth Lade,et al.  Will this be Quick?: A Case Study of Bug Resolution Times across Industrial Projects , 2015, ISEC.

[18]  Victor Hazlewood,et al.  On Automating XSEDE User Ticket Classification , 2014, XSEDE '14.

[19]  T. Schoenherr,et al.  Data Science, Predictive Analytics, and Big Data in Supply Chain Management: Current State and Future Potential , 2015 .

[20]  Hassan Rasheed,et al.  Data and infrastructure security auditing in cloud computing environments , 2014, Int. J. Inf. Manag..

[21]  Philip H. Siegel,et al.  Quantifying The Tradeoffs Between Cost And Quality For Systems Service Support , 2011 .

[22]  Stefan Strohmeier,et al.  Employee relationship management — Realizing competitive advantage through information technology? , 2013 .

[23]  Lyria Bennett Moses,et al.  Using Big Data for Legal and Law Enforcement Decisions: Testing the New Tools , 2014 .

[24]  Michael D. Myers,et al.  A set of ethical principles for design science research in information systems , 2014, Inf. Manag..

[25]  A. Bryman Social Research Methods , 2001 .

[26]  Liz Tilley,et al.  Is it the end for anonymity as we know it? A critical examination of the ethical principle of anonymity in the context of 21st century demands on the qualitative researcher , 2011 .

[27]  I. Nonaka,et al.  Leadership in Organizational Knowledge Creation: A Review and Framework , 2012 .

[28]  B. Tabachnick,et al.  Using Multivariate Statistics , 1983 .

[29]  Viswanath Venkatesh,et al.  Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..

[30]  Melissa Dark,et al.  Toward a Data Spillage Prevention Process in Hadoop using Data Provenance , 2015, CLHS '15.

[31]  Ahmed Y. Mahfouz,et al.  Strategic Integration of IT and Business Service Management , 2009, Communications of the IIMA.

[32]  T. Damianakis,et al.  Qualitative Research With Small Connected Communities , 2012, Qualitative health research.

[33]  Albert N. Greco,et al.  University Presses in the Twenty-first Century: The Potential Impact of Big Data and Predictive Analytics on Scholarly Book Marketing , 2015 .

[34]  Shrideep Pallickara,et al.  Predictive analytics using statistical, learning, and ensemble methods to support real-time exploration of discrete event simulations , 2016, Future Gener. Comput. Syst..

[35]  D. Brandt,et al.  How High Growth Economies Impact Global Information Technology Departments , 2012 .

[36]  Volker Wulf,et al.  Sharing Knowledge and Expertise: The CSCW View of Knowledge Management , 2013, Computer Supported Cooperative Work (CSCW).

[37]  T. Harrison,et al.  New Project Staffing for Outsourced Call Centers with Global Service Level Agreements , 2011 .

[38]  Robert Glenn Richey,et al.  A global exploration of Big Data in the supply chain , 2016 .

[39]  Okechukwu John Ekekwe Relationship Between Institutional Frameworks and Growth of SMEs in Nigeria's Petroleum Industry , 2013 .

[40]  Tracy Ann Sykes Support Structures and Their Impacts on Employee Outcomes: A Longitudinal Field Study of an Enterprise System Implementation , 2015, MIS Q..

[41]  B. Johnson Ethical issues in shadowing research , 2014 .

[42]  Alessandro Armando,et al.  Risk-Based Privacy-Aware Information Disclosure , 2015, Int. J. Secur. Softw. Eng..

[43]  Jasbir Kaur,et al.  Analysis of Different Techniques Used For Fault Tolerance , 2014 .

[44]  Marco D. Huesch,et al.  Health Affairs Challenges Implementing Electronic Health Care Predictive Analytics : Considerations And , 2014 .

[45]  Miguel A. García-Pérez,et al.  Statistical Conclusion Validity: Some Common Threats and Simple Remedies , 2012, Front. Psychology.

[46]  Heinz-Theo Wagner,et al.  Do Investors Recognize Information Technology As A Strategic Asset? A Longitudinal Analysis Of Changes In Ownership Structure And IT Capability , 2013, ECIS.

[47]  Rebecca K. Frels,et al.  Administering Quantitative Instruments with Qualitative Interviews: A Mixed Research Approach , 2013 .

[48]  M. Dodgson Organizational Learning: A Review of Some Literatures , 1993 .

[49]  C. Argyris Good communication that blocks learning , 1994 .

[50]  D. Boyd,et al.  CRITICAL QUESTIONS FOR BIG DATA , 2012 .

[51]  Kazu Okumoto,et al.  Integrative software design for reliability: Beyond models and defect prediction , 2012, Bell Labs Technical Journal.

[52]  Jacob Cohen,et al.  A power primer. , 1992, Psychological bulletin.

[53]  John Blossom The Signal Economy: How to target new revenues through predictive analytics , 2014, Inf. Serv. Use.

[54]  Karim Moustaghfir,et al.  Explicating Knowledge-based Competitive Advantage , 2012 .

[55]  Eric Allman,et al.  Managing technical debt , 2012, Commun. ACM.

[56]  Phillip Lynn Ashcraft,et al.  AskIT Service Desk Support Value Model , 2015 .

[57]  Beatrice Bressan,et al.  Knowledge Management: From Theory to Practice , 2014 .

[58]  Kim M. Nazi,et al.  A Participatory Approach to Designing and Enhancing Integrated Health Information Technology Systems for Veterans: Protocol , 2015, JMIR research protocols.

[59]  Khaled Salah,et al.  Modelling and analysis of rule-based network security middleboxes , 2015, IET Inf. Secur..

[60]  Carlos J. Costa,et al.  IO-SECI: a conceptual model for knowledge management , 2013, OSDOC '13.

[61]  Azween Abdullah,et al.  Intrusion Detection Forecasting Using Time Series for Improving Cyber Defence , 2015 .

[63]  Donald A. Schön,et al.  Organizational Learning: A Theory Of Action Perspective , 1978 .

[64]  Petra Kaufmann,et al.  Experimental And Quasi Experimental Designs For Research , 2016 .

[65]  E. Nevis,et al.  Understanding Organizations as Learning Systems , 1995 .

[66]  Yeshika Alversia,et al.  Doing quantitative research in education with SPSS , 2011 .

[67]  N. Hallberg,et al.  How Symmetrical Assumptions Advance Strategic Management Research , 2014 .

[68]  James R. Lund Service desk shuffle , 2012 .

[69]  E. Erdfelder,et al.  Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses , 2009, Behavior research methods.

[70]  R. Fassinger,et al.  Toward Best Practices in Quantitative, Qualitative, and Mixed- Method Research: A Social Justice Perspective , 2013 .

[71]  James Mahoney,et al.  Concepts and measurement: Ontology and epistemology , 2012 .

[72]  Sim Kim Lau,et al.  Relieving the Overloaded Help Desk: A Knowledge Management Approach , 2015, Communications of the IIMA.

[73]  Ulrike Marianne Murfett,et al.  Is Empathy Effective for Customer Service? Evidence From Call Center Interactions , 2013 .

[74]  Erik Elmroth,et al.  Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..

[75]  Tanty Oktavia,et al.  IMPLEMENTING DATA WAREHOUSE AS A FOUNDATION FOR DECISION SUPPORT SYSTEM (PERSPECTIVE : TECHNICAL AND NONTECHNICAL FACTORS) , 2014 .

[76]  Peter Bober Simulation for IT Service Desk Improvement , 2014 .

[77]  Donald R. Cooper,et al.  Business Research Methods , 1980 .

[78]  Hyeoun-Ae Park,et al.  Development of a Health Information Technology Acceptance Model Using Consumers’ Health Behavior Intention , 2012, Journal of medical Internet research.

[79]  Manjula Gandhi Selvaraj,et al.  Predicting Defects Using Information Intelligence Process Models in the Software Technology Project , 2015, TheScientificWorldJournal.

[80]  S. Eckstein The Belmont Report: ethical principles and guidelines for the protection of human subjects of research , 2003 .

[81]  Jill Eicher,et al.  Business Process Analytics , 2007 .

[82]  R. Anwar,et al.  A Review of the Uses of Crowdsourcing in Higher Education , 2013 .

[83]  Geir Kjetil Hanssen,et al.  From offshore outsourcing to insourcing and partnerships: four failed outsourcing attempts , 2014, Empirical Software Engineering.

[84]  Christian Bach,et al.  Qualitative Research Method Summary , 2014 .

[85]  V. M. Dalfard,et al.  Relations between transformational leadership, organizational learning, knowledge management, organizational innovation, and organizational performance: an empirical investigation of manufacturing firms , 2013 .

[86]  Ali Tafti,et al.  Information Technology and Firm Profitability: Mechanisms and Empirical Evidence , 2012, MIS Q..

[87]  W. Alex Edmonds,et al.  An applied reference guide to research designs : quantitative, qualitative, and mixed methods , 2013 .

[88]  Chen Li,et al.  Inside "Big Data management": ogres, onions, or parfaits? , 2012, EDBT '12.

[89]  Roman Dzuba,et al.  Exploring the Experiences of Call Center Employees Regarding Business Scripting , 2015 .

[90]  D. Bates,et al.  Investigating the cost-effectiveness of health information technologies: a systematic review protocol , 2013, BMJ Open.

[91]  Jack R. Fraenkel,et al.  Educational Research: A Guide to the Process , 1974 .

[92]  H. Suri Purposeful sampling in qualitative research synthesis , 2011 .

[93]  B. Whitley Principles of research in behavioral science , 1996 .

[94]  Suzanne Rivard,et al.  Information Technology Implementers' Responses to User Resistance: Nature and Effects , 2012, MIS Q..

[95]  Harvey J Motulsky,et al.  Common Misconceptions about Data Analysis and Statistics , 2014, The Journal of Pharmacology and Experimental Therapeutics.

[96]  Chih-Wen Wu,et al.  The performance impact of social media in the chain store industry , 2016 .

[97]  Peter A. Chow-White,et al.  From Patients to Petabytes: Genomic Big Data, Privacy, and Informational Risk , 2014 .

[98]  Raul Valverde,et al.  ITIL-based IT service support process reengineering , 2014, Intell. Decis. Technol..

[99]  H. Keith Edwards,et al.  Post-Implementation Management in Large-Scale Management Information Systems: Changes, Incident Reports, Help Desk Calls, and Business Process , 2008 .

[100]  Gustavo Vinueza Saving costs using smart call routing: aligning business and IT through finance , 2013 .

[101]  Wei Xu,et al.  Advances and challenges in log analysis , 2011, Commun. ACM.

[102]  Richard Boire Is predictive analytics for marketers really that accurate? , 2013 .

[103]  Takafumi Nakamura,et al.  Total System Intervention for System Failures and Its Application to Information and Communication Technology Systems , 2011 .

[104]  E. Olden,et al.  Architecting a Cloud-Scale Identity Fabric , 2011, Computer.

[105]  Naomie Salim,et al.  Mining FAQ from forum threads: theoretical framework , 2014 .

[106]  Abtin Refahi,et al.  A CBR-based Approach to ITIL-based Service Desk , 2011 .

[107]  Aijun An,et al.  Detection of malicious and non-malicious website visitors using unsupervised neural network learning , 2013, Appl. Soft Comput..

[108]  Ranjita Bhagwan,et al.  Deja vu: fingerprinting network problems , 2011, CoNEXT '11.

[109]  Steven R. Terrell,et al.  Mixed-Methods Research Methodologies , 2012 .

[110]  Katarzyna Musial,et al.  Next challenges for adaptive learning systems , 2012, SKDD.

[111]  Aaron M. French A Case Study on E-Banking Security â When Security BecomesToo Sophisticated for the User to Access Their Information , 2012 .

[112]  Andy P. Field,et al.  Discovering Statistics Using Ibm Spss Statistics , 2017 .

[113]  Kelly Caine,et al.  Patients want granular privacy control over health information in electronic medical records , 2013, J. Am. Medical Informatics Assoc..

[114]  Raul Valverde,et al.  An Implementation of ITIL Guidelines for IT Support Process in a Service Organization , 2013 .

[115]  Katherine L Kahn,et al.  Burdens on research imposed by institutional review boards: the state of the evidence and its implications for regulatory reform. , 2011, The Milbank quarterly.