Maturity models in business process management
Purpose–Maturity models are a prospering approach to improving a company's processes
and business process management (BPM) capabilities. In fact, the number of corresponding …
and business process management (BPM) capabilities. In fact, the number of corresponding …
Systematic literature review of usability capability/maturity models
TC Lacerda, CG von Wangenheim - Computer Standards & Interfaces, 2018 - Elsevier
A world becoming more digitally transformed and connected poses significant challenges for
IT organizations, requiring increased attention to the usability of their software products and …
IT organizations, requiring increased attention to the usability of their software products and …
What makes a useful maturity model? A framework of general design principles for maturity models and its demonstration in business process management
J Pöppelbuß, M Röglinger - 2011 - aisel.aisnet.org
Abstract Since the Software Engineering Institute has launched the Capability Maturity
Model almost twenty years ago, hundreds of maturity models have been proposed by …
Model almost twenty years ago, hundreds of maturity models have been proposed by …
Critical success factors for data governance: a theory building approach
The objective of this research study is to present the critical success factors (CSFs) for data
governance (DG). This paper reports on a single case study where data are gathered …
governance (DG). This paper reports on a single case study where data are gathered …
The effect of IT governance maturity on IT governance performance
There are several best practice based frameworks that detail effective arrangements for the
internal structure of an IT organization. Although it is reasonable that there is a correlation …
internal structure of an IT organization. Although it is reasonable that there is a correlation …
A process model for implementing information systems security governance
M Nicho - Information & Computer Security, 2018 - emerald.com
Purpose The frequent and increasingly potent cyber-attacks because of lack of an optimal
mix of technical as well as non-technical IT controls has led to increased adoption of security …
mix of technical as well as non-technical IT controls has led to increased adoption of security …
An overlapless incident management maturity model for multi-framework assessment (ITIL, COBIT, CMMI-SVC)
J Aguiar, R Pereira, J Braga Vasconcelos… - … Journal of Information …, 2018 - repository.utl.pt
Aim/Purpose: This research aims to develop an information technology (IT) maturity model
for incident management (IM) process that merges the most known IT frame-works' practices …
for incident management (IM) process that merges the most known IT frame-works' practices …
Method engineering as design science
G Goldkuhl, F Karlsson - Journal of the Association for Information …, 2020 - aisel.aisnet.org
In this paper, we motivate, devise, demonstrate, and evaluate an approach for the research-
based development of information systems development methods (ISDMs). This approach …
based development of information systems development methods (ISDMs). This approach …
Development and evaluation of a software-mediated process assessment method for IT service management
IT service improvements can add immense value to organisations. To improve IT service
management (ITSM) processes, a software-mediated process assessment method is …
management (ITSM) processes, a software-mediated process assessment method is …
Business process management: a maturity assessment of Saudi Arabian organizations
O AlShathry - Business Process Management Journal, 2016 - emerald.com
Purpose–Business Process Management (BPM) has become increasingly common among
organizations in different industries. There is very limited research on the application of BPM …
organizations in different industries. There is very limited research on the application of BPM …