Proactive IT Incident Prevention: Using Data Analytics to Reduce Service Interruptions
暂无分享,去创建一个
[1] Mark Burdon,et al. Re-conceptualising privacy and discrimination in an age of talent analytics , 2014 .
[2] Tom Fawcett,et al. Data Science and its Relationship to Big Data and Data-Driven Decision Making , 2013, Big Data.
[3] Marc Applebaum. Phenomenological Psychological Research as Science , 2012 .
[4] H. Ferdowsian,et al. Human and Animal Research Guidelines: Aligning Ethical Constructs with New Scientific Developments , 2011, Bioethics.
[5] Stephen Chong,et al. Self-Identifying Data for Fair Use , 2015, JDIQ.
[6] Jonna Järveläinen,et al. IT incidents and business impacts: Validating a framework for continuity management in information systems , 2013, Int. J. Inf. Manag..
[7] Pedro M. Domingos. A few useful things to know about machine learning , 2012, Commun. ACM.
[8] Harry Katzan,et al. Foundations Of Service Science Management And Business , 2008 .
[9] Namhun Kim,et al. Performance assessment in an interactive call center workforce simulation , 2011, Simul. Model. Pract. Theory.
[10] J. Pallant. SPSS survival manual : a step-by-step guide to data analysis using SPSS version 15 , 2007 .
[11] Syeda Farha Shazmeen,et al. Performance Evaluation of Different Data Mining Classification Algorithm and Predictive Analysis , 2013 .
[12] Jennifer Neville,et al. Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems , 2012, NSDI.
[13] Jongwoo Kim,et al. Incident-centered information security: Managing a strategic balance between prevention and response , 2014, Inf. Manag..
[14] T. Salthouse. All data collection and analysis methods have limitations: reply to Rabbitt (2011) and Raz and Lindenberger (2011). , 2011, Psychological bulletin.
[15] G. D. Sardana,et al. A case study of service desk's performance measurement system , 2012 .
[16] Martin Kornberger,et al. The visible hand and the crowd: Analyzing organization design in distributed innovation systems , 2017 .
[17] Prasanth Lade,et al. Will this be Quick?: A Case Study of Bug Resolution Times across Industrial Projects , 2015, ISEC.
[18] Victor Hazlewood,et al. On Automating XSEDE User Ticket Classification , 2014, XSEDE '14.
[19] T. Schoenherr,et al. Data Science, Predictive Analytics, and Big Data in Supply Chain Management: Current State and Future Potential , 2015 .
[20] Hassan Rasheed,et al. Data and infrastructure security auditing in cloud computing environments , 2014, Int. J. Inf. Manag..
[21] Philip H. Siegel,et al. Quantifying The Tradeoffs Between Cost And Quality For Systems Service Support , 2011 .
[22] Stefan Strohmeier,et al. Employee relationship management — Realizing competitive advantage through information technology? , 2013 .
[23] Lyria Bennett Moses,et al. Using Big Data for Legal and Law Enforcement Decisions: Testing the New Tools , 2014 .
[24] Michael D. Myers,et al. A set of ethical principles for design science research in information systems , 2014, Inf. Manag..
[25] A. Bryman. Social Research Methods , 2001 .
[26] Liz Tilley,et al. Is it the end for anonymity as we know it? A critical examination of the ethical principle of anonymity in the context of 21st century demands on the qualitative researcher , 2011 .
[27] I. Nonaka,et al. Leadership in Organizational Knowledge Creation: A Review and Framework , 2012 .
[28] B. Tabachnick,et al. Using Multivariate Statistics , 1983 .
[29] Viswanath Venkatesh,et al. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..
[30] Melissa Dark,et al. Toward a Data Spillage Prevention Process in Hadoop using Data Provenance , 2015, CLHS '15.
[31] Ahmed Y. Mahfouz,et al. Strategic Integration of IT and Business Service Management , 2009, Communications of the IIMA.
[32] T. Damianakis,et al. Qualitative Research With Small Connected Communities , 2012, Qualitative health research.
[33] Albert N. Greco,et al. University Presses in the Twenty-first Century: The Potential Impact of Big Data and Predictive Analytics on Scholarly Book Marketing , 2015 .
[34] Shrideep Pallickara,et al. Predictive analytics using statistical, learning, and ensemble methods to support real-time exploration of discrete event simulations , 2016, Future Gener. Comput. Syst..
[35] D. Brandt,et al. How High Growth Economies Impact Global Information Technology Departments , 2012 .
[36] Volker Wulf,et al. Sharing Knowledge and Expertise: The CSCW View of Knowledge Management , 2013, Computer Supported Cooperative Work (CSCW).
[37] T. Harrison,et al. New Project Staffing for Outsourced Call Centers with Global Service Level Agreements , 2011 .
[38] Robert Glenn Richey,et al. A global exploration of Big Data in the supply chain , 2016 .
[39] Okechukwu John Ekekwe. Relationship Between Institutional Frameworks and Growth of SMEs in Nigeria's Petroleum Industry , 2013 .
[40] Tracy Ann Sykes. Support Structures and Their Impacts on Employee Outcomes: A Longitudinal Field Study of an Enterprise System Implementation , 2015, MIS Q..
[41] B. Johnson. Ethical issues in shadowing research , 2014 .
[42] Alessandro Armando,et al. Risk-Based Privacy-Aware Information Disclosure , 2015, Int. J. Secur. Softw. Eng..
[43] Jasbir Kaur,et al. Analysis of Different Techniques Used For Fault Tolerance , 2014 .
[44] Marco D. Huesch,et al. Health Affairs Challenges Implementing Electronic Health Care Predictive Analytics : Considerations And , 2014 .
[45] Miguel A. García-Pérez,et al. Statistical Conclusion Validity: Some Common Threats and Simple Remedies , 2012, Front. Psychology.
[46] Heinz-Theo Wagner,et al. Do Investors Recognize Information Technology As A Strategic Asset? A Longitudinal Analysis Of Changes In Ownership Structure And IT Capability , 2013, ECIS.
[47] Rebecca K. Frels,et al. Administering Quantitative Instruments with Qualitative Interviews: A Mixed Research Approach , 2013 .
[48] M. Dodgson. Organizational Learning: A Review of Some Literatures , 1993 .
[49] C. Argyris. Good communication that blocks learning , 1994 .
[50] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[51] Kazu Okumoto,et al. Integrative software design for reliability: Beyond models and defect prediction , 2012, Bell Labs Technical Journal.
[52] Jacob Cohen,et al. A power primer. , 1992, Psychological bulletin.
[53] John Blossom. The Signal Economy: How to target new revenues through predictive analytics , 2014, Inf. Serv. Use.
[54] Karim Moustaghfir,et al. Explicating Knowledge-based Competitive Advantage , 2012 .
[55] Eric Allman,et al. Managing technical debt , 2012, Commun. ACM.
[56] Phillip Lynn Ashcraft,et al. AskIT Service Desk Support Value Model , 2015 .
[57] Beatrice Bressan,et al. Knowledge Management: From Theory to Practice , 2014 .
[58] Kim M. Nazi,et al. A Participatory Approach to Designing and Enhancing Integrated Health Information Technology Systems for Veterans: Protocol , 2015, JMIR research protocols.
[59] Khaled Salah,et al. Modelling and analysis of rule-based network security middleboxes , 2015, IET Inf. Secur..
[60] Carlos J. Costa,et al. IO-SECI: a conceptual model for knowledge management , 2013, OSDOC '13.
[61] Azween Abdullah,et al. Intrusion Detection Forecasting Using Time Series for Improving Cyber Defence , 2015 .
[63] Donald A. Schön,et al. Organizational Learning: A Theory Of Action Perspective , 1978 .
[64] Petra Kaufmann,et al. Experimental And Quasi Experimental Designs For Research , 2016 .
[65] E. Nevis,et al. Understanding Organizations as Learning Systems , 1995 .
[66] Yeshika Alversia,et al. Doing quantitative research in education with SPSS , 2011 .
[67] N. Hallberg,et al. How Symmetrical Assumptions Advance Strategic Management Research , 2014 .
[68] James R. Lund. Service desk shuffle , 2012 .
[69] E. Erdfelder,et al. Statistical power analyses using G*Power 3.1: Tests for correlation and regression analyses , 2009, Behavior research methods.
[70] R. Fassinger,et al. Toward Best Practices in Quantitative, Qualitative, and Mixed- Method Research: A Social Justice Perspective , 2013 .
[71] James Mahoney,et al. Concepts and measurement: Ontology and epistemology , 2012 .
[72] Sim Kim Lau,et al. Relieving the Overloaded Help Desk: A Knowledge Management Approach , 2015, Communications of the IIMA.
[73] Ulrike Marianne Murfett,et al. Is Empathy Effective for Customer Service? Evidence From Call Center Interactions , 2013 .
[74] Erik Elmroth,et al. Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..
[75] Tanty Oktavia,et al. IMPLEMENTING DATA WAREHOUSE AS A FOUNDATION FOR DECISION SUPPORT SYSTEM (PERSPECTIVE : TECHNICAL AND NONTECHNICAL FACTORS) , 2014 .
[76] Peter Bober. Simulation for IT Service Desk Improvement , 2014 .
[77] Donald R. Cooper,et al. Business Research Methods , 1980 .
[78] Hyeoun-Ae Park,et al. Development of a Health Information Technology Acceptance Model Using Consumers’ Health Behavior Intention , 2012, Journal of medical Internet research.
[79] Manjula Gandhi Selvaraj,et al. Predicting Defects Using Information Intelligence Process Models in the Software Technology Project , 2015, TheScientificWorldJournal.
[80] S. Eckstein. The Belmont Report: ethical principles and guidelines for the protection of human subjects of research , 2003 .
[81] Jill Eicher,et al. Business Process Analytics , 2007 .
[82] R. Anwar,et al. A Review of the Uses of Crowdsourcing in Higher Education , 2013 .
[83] Geir Kjetil Hanssen,et al. From offshore outsourcing to insourcing and partnerships: four failed outsourcing attempts , 2014, Empirical Software Engineering.
[84] Christian Bach,et al. Qualitative Research Method Summary , 2014 .
[85] V. M. Dalfard,et al. Relations between transformational leadership, organizational learning, knowledge management, organizational innovation, and organizational performance: an empirical investigation of manufacturing firms , 2013 .
[86] Ali Tafti,et al. Information Technology and Firm Profitability: Mechanisms and Empirical Evidence , 2012, MIS Q..
[87] W. Alex Edmonds,et al. An applied reference guide to research designs : quantitative, qualitative, and mixed methods , 2013 .
[88] Chen Li,et al. Inside "Big Data management": ogres, onions, or parfaits? , 2012, EDBT '12.
[89] Roman Dzuba,et al. Exploring the Experiences of Call Center Employees Regarding Business Scripting , 2015 .
[90] D. Bates,et al. Investigating the cost-effectiveness of health information technologies: a systematic review protocol , 2013, BMJ Open.
[91] Jack R. Fraenkel,et al. Educational Research: A Guide to the Process , 1974 .
[92] H. Suri. Purposeful sampling in qualitative research synthesis , 2011 .
[93] B. Whitley. Principles of research in behavioral science , 1996 .
[94] Suzanne Rivard,et al. Information Technology Implementers' Responses to User Resistance: Nature and Effects , 2012, MIS Q..
[95] Harvey J Motulsky,et al. Common Misconceptions about Data Analysis and Statistics , 2014, The Journal of Pharmacology and Experimental Therapeutics.
[96] Chih-Wen Wu,et al. The performance impact of social media in the chain store industry , 2016 .
[97] Peter A. Chow-White,et al. From Patients to Petabytes: Genomic Big Data, Privacy, and Informational Risk , 2014 .
[98] Raul Valverde,et al. ITIL-based IT service support process reengineering , 2014, Intell. Decis. Technol..
[99] H. Keith Edwards,et al. Post-Implementation Management in Large-Scale Management Information Systems: Changes, Incident Reports, Help Desk Calls, and Business Process , 2008 .
[100] Gustavo Vinueza. Saving costs using smart call routing: aligning business and IT through finance , 2013 .
[101] Wei Xu,et al. Advances and challenges in log analysis , 2011, Commun. ACM.
[102] Richard Boire. Is predictive analytics for marketers really that accurate? , 2013 .
[103] Takafumi Nakamura,et al. Total System Intervention for System Failures and Its Application to Information and Communication Technology Systems , 2011 .
[104] E. Olden,et al. Architecting a Cloud-Scale Identity Fabric , 2011, Computer.
[105] Naomie Salim,et al. Mining FAQ from forum threads: theoretical framework , 2014 .
[106] Abtin Refahi,et al. A CBR-based Approach to ITIL-based Service Desk , 2011 .
[107] Aijun An,et al. Detection of malicious and non-malicious website visitors using unsupervised neural network learning , 2013, Appl. Soft Comput..
[108] Ranjita Bhagwan,et al. Deja vu: fingerprinting network problems , 2011, CoNEXT '11.
[109] Steven R. Terrell,et al. Mixed-Methods Research Methodologies , 2012 .
[110] Katarzyna Musial,et al. Next challenges for adaptive learning systems , 2012, SKDD.
[111] Aaron M. French. A Case Study on E-Banking Security â When Security BecomesToo Sophisticated for the User to Access Their Information , 2012 .
[112] Andy P. Field,et al. Discovering Statistics Using Ibm Spss Statistics , 2017 .
[113] Kelly Caine,et al. Patients want granular privacy control over health information in electronic medical records , 2013, J. Am. Medical Informatics Assoc..
[114] Raul Valverde,et al. An Implementation of ITIL Guidelines for IT Support Process in a Service Organization , 2013 .
[115] Katherine L Kahn,et al. Burdens on research imposed by institutional review boards: the state of the evidence and its implications for regulatory reform. , 2011, The Milbank quarterly.