2018 IEEE World Congress on Services (SERVICES) 2018
DOI: 10.1109/services.2018.00026
|View full text |Cite
|
Sign up to set email alerts
|

Design Science Research: A Suitable Approach to Scope and Research IT Service Catalogs

Abstract: Based on the best-practice framework ITIL, an IT service catalog is a system which displays all live IT services but does not manage service requests. Moreover, an IT service catalog also shows how IT services are technically realized. When implementing an IT service catalog as part of the IT service management, firms often struggle with service catalog implementation projects as it requires portfolio-wide information and knowledge about service design, service operations, the customers' use of services, servi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The researcher used the DSR methodology process, which consists of six sequential activities to design the secure MFA algorithm and develop the prototypes of the native G-MoMo applications. The activities included: (a) identifying the problem, (b) defining the objectives for the artefact, (c) designing and developing the artefact, (d) demonstrating and using the artefact, (e) evaluating the solution, and (f) communicating the problems, the artefact and its utility and effectiveness through publications (Peffers et al, 2007;Schorr & Hvam, 2018). This process of the DSR methodology ensured consistency with previous DSR theories and practices; it provided a nominal process for carrying out DSR in IS, and it guaranteed that the evidence obtained enabled the researchers to answer the initial research question (Peffers et al, 2007).…”
Section: Methodsmentioning
confidence: 99%
“…The researcher used the DSR methodology process, which consists of six sequential activities to design the secure MFA algorithm and develop the prototypes of the native G-MoMo applications. The activities included: (a) identifying the problem, (b) defining the objectives for the artefact, (c) designing and developing the artefact, (d) demonstrating and using the artefact, (e) evaluating the solution, and (f) communicating the problems, the artefact and its utility and effectiveness through publications (Peffers et al, 2007;Schorr & Hvam, 2018). This process of the DSR methodology ensured consistency with previous DSR theories and practices; it provided a nominal process for carrying out DSR in IS, and it guaranteed that the evidence obtained enabled the researchers to answer the initial research question (Peffers et al, 2007).…”
Section: Methodsmentioning
confidence: 99%
“…The researchers used the DSR methodology process, which consists of six sequential activities to design the secure MFA algorithm and develop the prototypes of the native G-MoMo applications. The activities included (1) identifying the problem, (2) defining the objectives for the artefact, (3) designing and developing the artefact, (4) demonstrating and using the artefact, (5) evaluating the solution, and (6) communicating the problems, the artefact and its utility and effectiveness through publications (Peffers et al, 2007;Schorr & Hvam, 2018). This process of the DSR methodology ensured consistency with previous DSR theories and practices; it provided a nominal process for carrying out DSR in IS, and it guaranteed that the evidence obtained enabled the researchers to answer the initial research question (Peffers et al, 2007).…”
Section: Methodsmentioning
confidence: 99%