MILITARY MANAGEMENT QUARTERLY

MILITARY MANAGEMENT QUARTERLY

Implementation Pattern of Information and Communication Technology Services in Defense-Military Organizations based on ITIL Pattern

Document Type : Research Paper

Authors
1 Associate Professor in Industrial Management, Management and Accounting Faculty, Allame Tabataba'i University (Corresponding Author)
2 Full Professor in Industrial Management, Management and Accounting Faculty, Allame Tabataba'i University
3 Associate Professor in Industrial Management, Management and Accounting Faculty, Allame Tabataba'i University
4 Ph.D. candidate in IT Management, Allame Tabataba'i University
Abstract
The Islamic Republic of Iran's Army provides many services through IT solutions, so proper management of these services is felt before deployment in the Army. ITIL is one of the most famous frameworks in realization of IT service management. This study aimed to find a model for the implementation of information and communication technology services in the Islamic Republic of Iran Army based on the ITIL model. This applied and mixed method study (qualitative-quantitative) has been performed in 3 stages. In the first stage, the initial conceptual model of research (consisting of 29 components) have been developed based on the documents, scientific articles and previous studies. Then, in the second stage, by conducting interviews with experts (Delphi method), the complementary model of research was compiled with 30 components, and in the third stage, for the quantitative validation of the proposed model, various statistical tests and confirmatory factor analysis method were used. Also, to confirm the hypotheses and the proposed model, structural equation modeling and Path Analysis methods are used via Smartpls3 software. The research pattern has been investigated based on different indices, after confirming the appropriateness of the coefficients (t-value). The evaluation of the final indices shows that the proposed model has suitable fit. In this way, the research pattern was approved by 5 main components and 30 sub-components.
Keywords

آذر، عادل. غلامزاده، رسول. قنواتی، مهدی. (1391). مدل‌سازی مسیری ساختاری در مدیریت کارب  نرم افزار Smart - Pls، تهران:‌ انتشارات نگاه دانش.
جعفرنژاد ثانی، سهیلا. (1392). نقش پیاده سازی ITIL و ISMS در تداوم خدمات فناوری اطلاعات، پایان‌نامه به راهنمایی محمدرضا تقوا، تهران: دانشگاه علامه طباطبائی.
جمالی، امینه. شیرازی، حسین. (1394). امنیت سامانه های فرماندهی نظامی تحت وب با استفاده از ترکیب دسته بندی های تک کلاسی. پدافند الکترونیکی و سایبری, 19-30.
رضائیان، علی و همکاران. (1391). تاثیر میزان بلوغ فرآیندهای فناوری اطلاعات بر تحقق نیازهای کسب و کار با رویکرد کوبیت: سازمان فاوا شهرداری اصفهان. پژوهشهای مدیریت در ایران، 63-78.
فیضی، کامران. ایران‌ دوست، منصور. (1392). دلفی: روشی برای تحقیق، تصمیم‌گیری و آینده‌پژوهی سازمان مدیریت صنعتی - 148 صفحه وزیری (شومیز) - چاپ 1.
موسسه آموزشی و تحقیقاتی صنایع دفاعی. (1388). بررسی و تحلیل تجربیات خارجی و داخلی در ارتباط با بومیسازی و پیادهسازی الگوی مدیریت خدمات فناوری اطلاعات (ITIL) در سازمانهای مختلف. 1-48.
Ahmad, N., & Shamsudin, Z. M. (2013). Systematic Approach to Successful Implementation of ITIL. Procedia Computer Science, 17, 237-244.
Berntsen, K. R. (2017, May 15). The use of ITIL and its effect on. Norway.
Cannon, D., Wheeldon, D., Lacy, S., & Hanna, A. (2011). ITIL service strategy. TSO.
Carol Boswell, S. C. (2012). Introduction to nursing research. 3rd ed. Burlington, MA: Jones & Bartlett Publishers.
Chen, A.-C., & Chou, S.-K. (2010). ISSUES IN IMPLEMENTING INFORMATION TECHNOLOGY SERVICE MANAGEMENT.
Chin, W. W. (1998) The partial least squares approach to structural equation model-ling.In G. A.
CIESIELSKA, M. (2017). IMPLEMENTATION OF ITIL SERVICE LIFECYCLE IN SMALL AND MEDIUM-SIZED ENTERPRISES OF POLISH ICT SECTOR. Information Systems in Management, 85-96.
Esteves, R., & Alves, P. (2013). Implementation of an Information Technology Infrastructure Library Process – the Resistance to Change. Procedia Technology, 9(0), 505-510.
Fateme Haji Ali Asgari,.. S. (2017). Affecting Factors on ITIL-Based Health IT Service Management. IJCSNS International Journal of Computer Science and Network Security.
Hristo Kyurkchiev,.. K. (2017, february 23). Logical Design for Configuration Management Based on ITIL. Retrieved from https://www.researchgate.net/publication/251197977.
Iden, J., & Eikebrokk, T. (2013). Implementing IT Service Management: A systematic literature review. International Journal of Information Management, 33(3), 512-523.
Lucio-Nieto, T., Colomo-Palacios, R., Soto-Acosta, P., Popa, S., & Amescua-Seco, A. (2012). Implementing an IT service information management framework: The case of COTEMAR. International Journal of Information Management, 32(6), 589-594.
Onwuegbuzie, A. J. (2007). A typology of mixed methods sampling designs in social science research. Qualitative Report, 12(2), 281-316.
Pollard, C., & Cater-Steel, A. (2009). Justifications, strategies, and critical success factors in successful ITIL implementations in US and Australian companies: an exploratory study. Information systems management, 26(2), 164-175.
Quhtani, M. A. (2017). Data Mining Usage in Corporate Information Security: Intrusion Detection Applications. Business Systems Research.
Rafael Ferreira de Oliveira,.. E. (2016). ESTUDO COMPARATIVO DA OPERAÇÃO DE SERVIÇO DE. Revista Destaques Acadêmicos, Lajeado.
Shaver, J. M. (2005). Testing for mediating variables in management research: concerns, implications, and alternative strategies, Journal of Management, (31), 330-353.
Tan, W.-G., Cater-Steel, A., & Toleman, M. (2009). Implementing it service management: A case study focussing on critical success factors. Journal of Computer Information Systems, 50(2), 1.
Tolga MATARACIOGLU, S. O. (2011). Governing Information Securityin Conjunction With COBIT and Iso27001. International Journal of Network Security & Its App.
Zahir Irani, P., Ahmad, N., Tarek Amer, N., Qutaifan, F., & Alhilali, A. (2013). Technology adoption model and a road map to successful implementation of ITIL. Journal of Enterprise Information Management, 26(5), 553-576.