You are on page 1of 12

International Journal of Information Technology and Business Management

29th June 2014. Vol.26 No.1


2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

A REVISED MODEL FOR THE IMPLEMENTATION OF THE ITIL


INCIDENT MANAGEMENT PROCESS IN BROADCAST
TECHNOLOGY OPERATIONS
Tristan K. ODwyer
Anglia Ruskin University
tristankarol@yahoo.com

Abstract
IT service management frameworks seek to provide and specify a set of tools and best practices for the
successful delivery of quality information technology services. The Information Technology Infrastructure
Library (ITIL) is probably the best known ITSM framework, and it is widely implemented across public sector
bodies in the UK. This paper discusses the implementation of the ITIL incident management process at BBC
Technology Operations within the conceptual framework of relevant operations theory. It argues that the
process is unsuitable for use in broadcast organisations with heterogeneous user-bases and divergent
technological needs. It proposes a revised model and a modified process.
Keywords: ITIL, IT Service Management, Operations Management, Broadcast Technology, Incident
Management

especially with regard to quality and efficiency, and


by Cater-Steel et al (2006) who, in replicating some
of Hochsteins research, arrived at similar
conclusions. Barafort et al (2002) and Spremic et al
(2008) have also confirmed the operational benefits
of ITIL implementation and Gacenga et al (2010, p.
28) claim that the view that ITIL can deliver
operational efficiencies is widely accepted by
Information Technology service managers.
While ITIL implementation has been
shown to deliver operational benefit and is
extremely useful in providing the how for service
management aspects (Nastase et al, 2009, p. 2),
Pollard and Cater-Steel (2009, p. 164) point out
that not all ITIL implementations are successful.
Implementing ITIL successfully is not without its
challenges (Tan et al, 2010; de Sousa Pereira and
da Silva, 2010) and there are numerous examples
of ITIL implementation projects failing (Sharifi et
al, 2008; Ahmad et al, 2013). Even where ITIL has
been successfully implemented, it is vital that
mechanisms are in place to ensure its performance
efficiency (Lucio-Nieto et al, 2012).
The ITIL process with the broadest
implementation
across
BBC
Technology
Operations is the incident management process.
Incidents are defined as an interruption to, or a
reduction in, service and are generally understood
as errors or technical failures (Bashir and Soomro,
2010). Addy (2007, p. 112) defines incident

INTRODUCTION
BBC Technology Operations provides
technology support to programme makers and
journalists working across divergent technical
platforms including television, radio and online
(Wallace, 2013). Its purpose is to facilitate
programme making by ensuring the high levels of
technical dependability which are essential to a
broadcasting organization (Slack et al, 2007, p. 53).
In common with many technology departments
within large organizations, it has made the
transition from a technology management to a
service based management model with the aim of
delivering strategic advantage to the business (Tang
and Todo, 2013).
In making the transition to a service based
management model, BBC Technology Operations
has
implemented
the
ITIL
(Information
Technology Infrastructure Library) framework, a
process-based set of best practices aimed at
increasing
service
delivery
and
service
management effectiveness (Kanagi, 2012).
Marrone and Kolbe (2011) argue that IT service
management frameworks are too easily imitated to
provide a competitive advantage, but concede that
ITIL implementation does deliver operational
benefits. The idea that ITIL delivers operational
benefit is echoed by Hochstein et al (2005),
1

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

management in much simpler terms as getting


systems and people up and running again when
something goes wrong. Addy goes on to identify a
list of common incident management issues, some
of which are evident in BBC Technology
Operations implementation of the ITIL incident
management process. These include extended
resolution times, inconsistent service delivery and
routing (assignment) errors.
This paper will seek to demonstrate that
the problems of extended resolution times and
inconsistent service delivery as identified by Addy
are a result of non-automatic routing of incidents
from the help desk agent (HDA) to the specialist
engineering agent (SEA), the lack of a facility for
routing of incidents to the relevant SEA type based
on skills type, and incorrect priority classification
of incidents. It proposes a modified process flow
with the aim of improving service quality.

Figure 1 ITIL Incident Management Process

Source: Computing Nebula (2010)

THE EXISTING PROCESS


The parts of the process model that sit
inside the grey area represent the escalation process.
In a pure ITIL model, the escalation is functional.
If the second line function cannot resolve the
incident, it is passed up the chain to support
functions with more specialist knowledge (Van
Bon et al, 2008).
The diverse nature of the technology
supported by BBC technology operations renders
the ITIL escalation model ineffective. Broadcast
technology is simultaneously divergent in that radio
and television engineering require different skills
and expertise, and convergent in that broadcast
technology is increasingly merging with IT
technology (Charleson, 2006). In the absence of a
process for correctly assigning incidents to SEAs in
the appropriate technology function, the divergent
nature of the skills-base means that a linear
escalation process
is
inappropriate.
The
shortcomings of the ITIL model in this regard are
recognized by Brenner (2006), who proposes that
ITIL service management processes should be
supported with suitable tools for workflow
management.
The consequence of this linear method of
escalation, combined with a lack of automatic
selection, is that incidents routinely remained
unassigned and lacking in ownership (Czegal,
1999) which in turn leads to the extended
resolution times and inconsistent delivery described
by Addy (2008). The negative impact of incorrect
assignment on service delivery has also been noted
by Barash et al (2007) and Bartolini et al (2009).
End-user frustration with the process often
results in users bypassing the help desk, a common

Ferreira and Mira da Silva (2008) describe


the process of incident management within an ITIL
framework. An incident is reported, normally by
telephone to a helpdesk, where it is recorded. The
incident is then classified by the HDA in terms of
type, impact and urgency. These classifications
determine the priority class of the incident.
The next step is described as matching,
which occurs when a solution exists for a known
problem or error. This process is sometimes
referred to as case-based retrieval (Simoudis, 1992).
If an incident cannot be matched to a known
solution then the next step is diagnosis, where all
the available information is gathered in order to
arrive at a solution. The application of the solution
leads to resolution and once normal service is
resumed the incident is closed.
During the diagnosis phase, the incident
undergoes a process termed escalation where it is
passed to various levels of support for investigation
and resolution (Bartolini and Salle, 2004). The
incident escalation process is cumulatively
hierarchic insofar as the incident passes through
various levels of specialization from general to
specific (First line to Nth Line) until resolution
(Long, 2008)
The following diagram illustrates the ITIL
incident management process flow:

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

problem in technology service management noted


by Niessink and Van Vliet (2000) Marquina et al
(2000), Ignatiadis and Nandhakumar (2007) and
Carney-Morris and Young (2012) and symptomatic
of a deep customer dissatisfaction with the current
system. The result of end users bypassing the help
desk is the decreased value of metrics and the
capturing of incomplete and distorted data (Donko
and Traljic, 2009)
The following diagram breaks down the
escalation process further. Incidents judged to be of
low or medium priority are placed in a general
ticketing queue. These incidents are then selfselected by SEAs monitoring the queue. The
process of self-selection is problematic in itself.
Incidents with no clear resolution are sometimes
ignored, simple incidents receive more attention as
they improve performance metrics and certain
technological areas are monopolized by individuals.
Addy (2008, p. 133) describes the potential
organizational impact of self-selection in terms of
misrepresentation of the value of an individuals
contribution, the creation of silos of knowledge
and expertise and inaccurate user satisfaction
metrics.
If an incident is classified as a high
priority, the HDA makes a direct call to the
engineering office to escalate a resolution. If the
phone is unattended then the agent will visit the
office in person. If an SEA with expertise in the
relevant technology function is not present then an
attempt will be made to contact an SEA in the field,
but this is an ad-hoc process.

A
REVIEW
OF
RELEVENT
OPERATIONS THEORY
The Theory of Constraints
Of relevance to the process in question is
the theory of constraints (Goldratt and Cox, 1984)
which suggests that a system or process is limited
in achieving its goals by a number of constraints.
The theory of constraints is widely applied in
project management (Blackstone et al, 2009; Tsou,
2012) and Gupta and Boyd (2008) go as far as to
suggest that the theory of constraints can act as a
general unifying theory of operations management.
Sale and Samuel Sale (2013) point to a lack of
empirical support for the theory of constraints, in
spite of its widespread adoption by practitioners,
while Naor et al (2013) question if the theory of
constraints satisfies the consensual definition of a
theory in an academic sense. Oglethorpe and Heron
(2013), however, hold that it can be effectively
applied to supply-chain management and Chou et
al (2012) demonstrated that the theory of
constraints could be used to improve inventory
management.
Six Sigma
Six Sigma is an approach used to
eliminate variability from processes through the use
of statistical tools and techniques. It has evolved
into an approach to process and quality
improvement since its introduction by Motorola in
1986 (Coronado and Anthony, 2002) and it is of
relevance to the process in question because of its
emphasis on business process mapping as a
technical tool (Pyzdek and Keller, 2009). Six
Sigma was developed in the context of
manufacturing and some dispute its applicability to
other sectors (Denk, 2005). Goh (2010, p. 302)
calls the belief in Six Sigmas universal
applicability its Achilles heel and its efficacy
has been called into question (Goh, 2012; Yuksel,
2012). However, the Six Sigma approach has
gained widespread acceptance among practitioners,
with numerous studies demonstrating its benefits
(Jou et al, 2010; Mahdi and Almsafir, 2012; Shafer
and Moeller, 2012; Gutierrez, 2012) while others
have demonstrated its applicability to service
operations (Johannsen et al, 2011; De la Lama et al,
2013, El-Banna, 2013)

Figure 2 Incident Escalation Process

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com
al, 1994; Earl et al, 1995; Janz et al, 1997), which
propose a more holistic approach based on strategic
alignment.

Queueing Theory
Queueing theory applies mathematical
models in scenarios where demand for a service
exceeds availability, in an effort to identify the
limitations of a service (Gross et al, 2008). It is of
particular interest to technology support functions
where demand is cyclic and random (Green et al,
2003). Queueing theory grew out of research
conducted by Erlang (1909) in the context of
telephone exchanges and it has found particular
application in the analysis of customer support and
technology help desks, (Betts et al, 2000;
Jongbloed and Koole, 2001; Garnett et al, 2002;
Koole and Mandelbaum, 2002; Ridley et al, 2003;
Brown et al, 2005; Nah and Kim, 2013) so it has
specific relevance to the process in question.

The Application of Six Sigma


Six Sigma provides a number of tools,
which could be successfully applied to the
improvement of the process in question. The
DMAIC cycle (define, measure, analyze, improve
and control) is a core Six Sigma tool (Pande et al,
2002) which could provide a valuable framework
when applied to the incident management process.
The control stage of the cycle could be of particular
value in evaluating the success of the process
change ex post-facto. However, it is less clear what
the value of the statistical elements of Six Sigma
might be when applied to the incident management
process and how these might be applied in practice.
Chakraborty and Tan (2012) cite practical
difficulties in applying Six Sigma to service
organizations as service organizations tend to
prefer the use of soft tools to rigorous statistical
tools. The practical difficulties in applying Six
Sigma to service processes are also noted by
Antony et al (2007)

Decision Theory
Peterson (2008, p. 1) calls decision theory
the theory of rational decision making. Arrow
(1957, p. 765) describes it as the formalization of
the problems involved in making optimal choices.
It is of relevance to this process as a decision is
made by the HDA at the point of categorization and
again at the point of escalation and the modified
operational model discussed later adds an extra
point of decision to the process. The normative
theory, what Bell et al (1988) call the ought of
decision-making is applicable to this process and
numerous models of the decision making process
have been proposed (Beach and Mitchell, 1978;
Einhorn and Hogarth, 1981; Schwenk, 1984).

The Application of Queueing Theory


The general incident management ticket
queue illustrated in figure 2 is an example of a
multiclass queueing network. A MCQN is a
network where different jobs with different service
requirements and routes to completion are held
(Harrison, 1988). As well as holding multiple
classes of job, the queueing system employs a
priority model intended to achieve an optimal
trade-off between the consequences of various
levels of technical failure rather than an equitable
first-come-first-served system (Federgruen and
Groenevelt, 1988). The priority class of the
incident is determined by the HDA, and the priority
classification in turn determines the process of
escalation, as illustrated in figure 2.
Stolletz and Helber (2004) describe a
queueing model based on customer profiles and
agent characteristics, which forms the basis for the
suggested revised model of the incident
management system, which is detailed later. The
Stolletz and Helber model is directly applicable to
the incident management process because it
describes an inbound support centre with
heterogeneous customers and heterogeneous agents.
Of particular interest is the concept of routing
policies, where an agent selection policy describes

A COMPARISON OF THE THEORY


WITH THE PROCESS
The Application of the Theory of Constraints
In the theory of constraints, constraints are
usually said to be internal or external (Cox and
Schleier, 2010) and in this case the incident
management process is constrained internally by
the assignment procedures in the escalation stage.
The application of TOC to the incident
management process would involve focusing on
and improving or removing this stage of the
process (Dettmer, 1997), and an alternative
assignment and escalation phase that removes this
constraint is considered later. The concept of
focusing on specific system constraints is what
differentiates TOC from other forms of business
process reengineering, such as that proposed by
Hammer (1990) and described by others (Dixon et
4

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

how the call is routed and the customer selection


policy addresses the issue of customer priority.
The idea of skills based routing in a
queueing system is further explored by Garnett and
Mandelbaum (2000) and by Wallace and Whitt
(2005), who developed an algorithm to address the
problem of assigning jobs to agents with the
relevant skills. Garnett and Mandelbaum describe
the main elements of a skills based routing system
in terms of defining customer types, defining the
agent types (skills and numbers) and defining how
customers are routed to agents, which they call the
control policy. The application of these elements
will form part of the revised model for the incident
management system.

queueing model and by passing the decision on


priority classification up the chain towards SEAs.
The idea of the decision on priority
classification being determined by better informed
specialized agents is an important one in terms of
customer satisfaction. Ramasubbu et al (2008) link
customer satisfaction in technology support to the
technical skills of the support agent while Negash
et al (2002) identify assurance, in terms of the users
confidence in the ability of the agent, as a
contributing factor to customer satisfaction in
technology support services. The positive effect of
knowledgeable staff on customer satisfaction in
technology support environments and call centres is
well documented in the literature (Feinberg et al,
2000; Palson and Seidlitz, 2000; Abdullateef et al,
2011; Lau and Chan, 2012)

The Application of Decision Theory

TOWARDS A REVISED MODEL AND


A MODIFIED PROCESS

In the ITIL model, the HDA makes two


sets of decisions, the classification of the incident
priority class and the decision to escalate. In reality,
the decision to escalate occurs when the HDA is
unable to resolve the incident through matching or
case based retrieval and decision theory would
describe this as a decision forced by the lack of an
alternative decision (Rapoport and Wallsten, 1972).
The classification of the incident priority
class is a complex one as it is difficult for the HDA
to make a valid technical assessment and to
objectively evaluate the technical impact of the
incident because of the complexity of the systems
in question (Elmisalami et al, 2006). Classical
normative decision theory assumes a fully rational
decision maker who is fully informed (Resnik,
1987). However, a lack of cross training and the
generalist nature of the HDAs skills-set means
they often lack the specialist knowledge required to
make a fully informed decision on priority
classification (Adria and Chowdhury, 2002; Tekin
et al, 2009). The revised model proposes removing
the decision on priority classification from the
HDA and substituting a decision on skills based
routing as described by Stolletz and Helber (2004).

The revised process model calls for certain


changes to the ITIL incident management process
and ultimately arrives at a hybrid model, which sits
between ITIL and the model proposed by Stolletz
and Helber.
In the revised model the support functions
are divided into television, radio and online,
reflecting the platforms supported by BBC
Technology Operations. Rather than the linear
escalation process recommended by ITIL, the
incidents are escalated to the appropriate
technology function. In practice this means that any
incident that cannot be resolved by the HDA over
the phone is routed to an SEA working in the
appropriate technology function. This is the skillsbased routing described by Stolletz and Helber,
Garnett and Mandelbaum and Wallace and Whitt
and it is achieved by the use of an automatic call
distributer block, similar to that described by Gans
and Zhou (2007). The ACD routes the call to an
SEA within the appropriate support function. If the
call is not answered it is routed to another SEA
within the same technology function until an
engineer becomes available. Because the
assignment is automatic, it avoids many of the
problems associated with self-selection of incidents
described by Addy.
Once the call has been routed to an SEA
within the appropriate technology function, the
SEA makes the decision on priority classification.
This leads to an optimal decision on priority
classification because, under classical normative
decision theory, the SEA is this scenario is a fully
informed decision maker because of his specialist

A Brief Word on Quality and Customer


Satisfaction
In service operations, there is a direct
relationship between service quality and customer
satisfaction (Aguila et al, 2013; He and Li, 2011;
Sunayna, 2013; Yee et al, 2013). The proposed
process changes seek to improve service quality by
decreasing incident resolution times and improving
the consistency of service through the removal of
constraints, the implementation of an improved
5

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

knowledge of the technology. The proposed new


approach recognizes that the primary constraint in
the current system is the linear escalation model,
which makes no provision for assigning incidents
to the correct technology function.
The revised model is built on the
recognition that incidents are rarely resolved in the
first instance by the helpdesk, and normally require
escalation. The suggested process therefore ensures
that incidents are escalated to the correct
technology function, ensuring a more rapid
resolution. The fact that technical support calls are
rarely resolved by HDAs in the first instance is
well documented (Cohen, 2006; Bellman, 2007;
Sisselman and Whitt, 2007; Fest, 2008; Hildebrandt,
2009), making an efficient escalation process all
the more imperative.

supported technology systems are homogeneous


and therefore makes no provision for skills based
escalation. It also has no provision for automatic
assignment and is therefore only suitable in support
functions where the support task is routine and
low in complexity (Shah and Bandi, 2003, p. 418).
While the incident management process
has been altered, it still sits inside the broader ITIL
framework, and is actually a hybrid model,
mapping Stolletz and Helbers skills based
escalation model onto the ITIL framework and
shifting
the
decision
regarding
priority
classification onto the SEAs. The new model
retains two ITIL tools, the configuration
management database and the known error
database, and integrates with the problem
management process, which seeks identify the root
cause where multiple incidents of a similar class
occur (Sutherland, 2012). The integration of the
new process and the ITIL framework is illustrated
in Figure 4.
The revised model successfully addresses
the issues of assignment, routing and priority
classification, which in turn should have a positive
effect on resolution times and service consistency.
The link between skills based routing and faster
resolution times and increased service delivery has
been documented by Bapat and Pruitte (1998);
Anton (2000); Mazzuchi and Wallace, (2004);
Whit (2006); Aksin et al (2009); Helber and
Henken (2010) and by Feldman and Mandelbaum
(2010).
Collins and Sisley (1994) demonstrated
that automatic assignment of service personnel
leads to better service delivery and Lazarov and
Shovai (2002) demonstrated that automatic
assignment is more efficient in most cases.
While the revised process shifts
responsibility for incident priority classification
from the HDA to the SEA, it still retains the ITIL
process for incident classification described earlier
as it recognizes that a policy for task prioritization
should be applied, especially where fast resolution
is critical for customer satisfaction (Zhao and Stohr,
1999) although it would recommend that skilled
practitioners be given some flexibility and
discretion in order to provide ensure optimum
service delivery (Patterson et al, 2011)

Figure 3 Revised Escalation Process

In the new model there is no ticket


assignment delay, as the incident is automatically
assigned to an SEA who then takes the decision on
priority classification. Ticket assignment delays
lead to extended resolution time and are a primary
contributing factor to service level agreement
failure in IT services (Cavalcante et al, 2013). The
new model also facilitates the heterogeneous nature
of the technology systems and acknowledges that
different end users have different support
requirements, depending on the sophistication of
the technology and their user characteristics in
terms of skill level (Mirani and King, 1994).
The shortcomings of the ITIL incident
management process are that it makes a number of
assumptions. Firstly it assumes a perfectly
informed HDA able to make an optimal decision on
priority classifications. Secondly it assumes that the

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com
Figure 4 Revised Escalation Process Mapped Onto ITIL
Framework

REFERENCES
1.

2.

3.

4.

5.

6.

Abdullateef, A.O., Mokhtar, S.S.M.,


Yusoff, R.Z (2011) The mediating effects
of first call resolution on call centers
performance. Journal of Database
Marketing
&
Customer
Strategy
Management, Volume 18, Issue 1, March,
pp. 16-30
Addy, R (2007) Effective IT Service
Management: To ITIL and Beyond!
Heidelberg: Springer.
Adria, M., Chowdhury, S.D (2002)
Making Room for the Call Center.
Information
Systems
Management,
Volume 19, Issue 1, pp. 71-81
Aguila-Obra, A.R.D., Padilla-Melendez,
A., Al-dweeri, R.M.O.O (2013) The
influence of electronic service quality on
loyalty in postal services: the mediating
role of satisfaction. Total Quality
Management & Business Excellence,
Volume 24, Issue 9 and 10, October, pp.
1111-1123
Ahmad, N., Amer, N.T., Qutaifan, F.,
Alhilali, A (2013) Technology Adoption
Model And A Road Map To Successful
Implementation of ITIL. Journal of
Enterprise Information Management,
Volume 26, Issue 5, pp. 553-576
Aksin, Z., Armony, M., Mehrotra, V
(2009) The Modern Call Center: A MultiDisciplinary Perspective on Operations
Management Research. Production and
Operations Management, Volume 16,
Issue 6, pp. 665-688

7.

Anton, J (2000) The past, present and


future of customer access centers.
International Journal of Service Industry
Management, Volume 11, Issue 2, pp.
120-130
8. Antony, J., Antony, F.J., Kumar, M., Cho,
B.R (2007) Six Sigma in Service
Organisations: Benefits, Challenges and
Difficulties, Common Myths, Empirical
Observations and Success Factors.
International Journal of Quality &
Reliability Management, Volume 24,
Issue 3, pp. 294-311
9. Arrow, K.J (1957) Decision Theory and
Operations
Research.
Operations
Research, Volume 5, Issue 6, pp. 765-774
10. Bapat, V., Pruitte, E.B (1998) Using
Simulation in Call Centers. Winter
Simulation Conference Proceedings, pp.
1395-1399
11. Barafort, B, Di Renzo, B., Merlan, O
(2002) Benefits Resulting from the
Combined Use of ISO/IEC 15504 with the
Information Technology Infrastructure
Library (ITIL) in Oivo, M., Komi-Sirvio,
S (Eds) Product Focused Software
Process Improvement 4th International
Conference, PROFES 2002, Rovaniemi,
Finland,
December
9-11,
2002.
Heidelberg: Springer
12. Barash, G., Bartolini, C., Liya, W (2007)
Measuring
and
Improving
the
Performance
of
an
IT
Support
Organization in Managing IT Incidents.

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

13.

14.

15.

16.

17.

18.

19.

20.

21.

22.

www.jitbm.com

Proceedings of the 2nd IEEE/IFIP


International Workshop on BusinessDriven IT Management, 21st May,
Munich, pp. 11-18
Bartolini, C., Salle, M (2004) Business
Driven Prioritization of Service Incidents
in Sahai, A., Wu, F (Eds) Utility
Computing: 15th IFIP/IEEE International
Workshop on Distributed Systems:
Operations and Management, DSOM
2004 Davis, CA, USA, November 15-17,
2004. New York: Springer
Bartolini, C., Stefanelli, C., Tortonesi, M
(2009) Business-impact analysis and
simulation of critical incidents in IT
service management. Proceedings of the
IFIP/IEEE International Symposium on
Integrated Network Management, 1-5th
June, Long Island, N.Y.
Bashir, A., Soomro, T.R (2010)
Comparative
Study
on
Incident
Management. International Journal of
Applied Information Systems, Volume 3,
Issue 2, pp. 21-23
Beach, L.R., Mitchell, T.R (1978) A
Contingency Model for the Selection of
Decision
Strategies.
Academy
of
Management Review, Volume 3, Issue 3,
pp. 439-449
Bell, D.E., Raiffa, H., Tversky, A (1988)
Decision Making: Descriptive, Normative
and Prescriptive Interactions. Cambridge:
Cambridge University Press.
Bellman, B (2007) Tools for First Call
Resolution-Making Contact Centers More
Efficient and Responsive. Business
Communications Review, Volume 37,
Issue 12, pp. 28-30
Betts, A., Meadows, M., Walley, P (2000)
Call Centre Capacity Management.
International Journal of Service Industry
Management, Volume 11, Issue 2, pp.
185-196
Blackstone, J.H., Cox, J.F., Scheier, J.G
(2009) A Tutorial on Project Management
from a Theory of Constraints Perspective.
International Journal of Production
Research, Volume 47, Issue 24, pp. 70297046
Brenner, M (2006) Classifying ITIL
processes; A Taxonomy under Tool
Support Aspects. Proceedings of the First
IEEE/IFIP International Workshop on
Business-Driven IT Management. 7th
April 2006, pp. 19-28
Brown, L., Gans, N., Mandelbaum, A.,
Sakov, A., Haipeng, S., Zeltyn, S., Zhao,
L (2005) Statistical Analysis of a
Telephone Call Center: A QueueingScience Perspective. Journal of the
American Statistical Association, Volume
100, Issue 469, March, pp. 36-50

23. Carney-Morris, M., Young, E (2012)


Getting the Most Out of Your Help Desk
Software. Proceedings of the 40th Annual
ACM SIGUCCS Conference, pp. 213-218
24. Cater-Steel, A.P, Toleman, M., Tan, W
(2006)
Transforming
IT
Service
Management- The ITIL Impact. Paper
presented at the 17th Australasian
Conference on Information Systems.
25. Cavalcante, V.F., Pinhanez, C.S., de Paula,
R.A., Andrade, C.S., de Souza, C.R.B.,
Appel, A.P (2013) Data-Driven Analytical
Tools for Characterization of Productivity
and Service Quality Issues in IT Service
Factories. Journal of Service Research,
Volume 16, Issue 3, pp. 295-310
26. Chakraborth, A., Tan, K.C (2012) Case
Study
Analysis
of
Six
Sigma
Implementation in Service Organizations.
Business Process Management Journal,
Volume 18, Issue 6, pp. 992-1019
27. Charleson, C (2006) Broadcast digital
asset management at Lifetime Television.
Journal of Digital Asset Management,
Volume 2, Issue 2, March, pp. 109-118
28. Chou, Y.C., Lu, C.H., Tang, Y-Y (2012)
Identifying inventory problems in the
aerospace industry using the theory of
constraints. International Journal of
Production Research, Volume 50, Issue
16, August, pp. 4686-4698
29. Cohen, A (2006) Beyond First Call
Resolution. CRM Magazine, Volume 10,
Issue 11, p. 6
30. Collins, J.E., Sisley, E.M (1994)
Automated Assignment and Scheduling of
Service Personnel. IEEE Expert, Volume
9, Issue 2, pp. 33-39
31. Computing Nebula (2010) Incident
Management | Thoughts on Cloud
Computing and ITIL. [online] Available
at:
http://computingnebula.wordpress.com/ca
tegory/itil/incident-management/
[Accessed: 3 Dec 2013].
32. Coronado, R.B., Antony, J (2002) Critical
Success Factors for the Successful
Implementation of Six Sigma Projects in
Organisations. The TQM Magazine,
Volume 14, Issue 2, pp. 92-99
33. Cox, J.F., Schleier, J.G (2010) Theory of
Constraints Handbook. New York:
McGraw Hill.
34. Czegel,
B
(1999)
Help
Desk
Practitioners Handbook. New York:
John Wiley & Sons.
35. Denk, W. (2005) Six Sigma the
Breakthrough Management Strategy?
Economic Quality Control, Volume 20,
Issue 2, pp. 171-176
36. De la Lama, J., Fernandez, J., Punzano,
J.A., Nicolas, M., Nin, S., Mengual, R.,

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

37.

38.

39.

40.

41.

42.

43.

44.

45.

46.

www.jitbm.com

Ramirez, J.A., Raya, A.L., Ramos, G


(2013) Using Six Sigma tools to improve
internal processes in a hospital centre
through three pilot projects. International
Journal of Healthcare Management,
Volume 6, Issue 3, August, pp. 158-167
Dettmer, H.W (1997) Goldratts Theory
of Constraints: A Systems Approach to
Continuous Improvement. Milwaukee:
Quality Press
De Sousa Pereira, R.F., da Silva, M.M
(2010)
A
Maturity
Model
for
Implementing ITIL V3. Proceedings of the
6th World Conference on Services, Miami,
5-10th July, pp. 399-406
Dixon, R.J., Arnold, P., Heineke, J., Kim,
J.S., Mulligan, P (1994) Business Process
Reengineering: Improving in New
Strategic
Directions.
California
Management Review, Volume 36, Issue 4,
pp. 93-108
Donko, D., Traljic, I (2009) Measurement
of
Service
Effectiveness
and
Establishment of Baselines. WSEAS
Transactions on Information Science and
Applications, Volume 6, Issue 8, August,
pp, 1310-1319
Earl, M.J., Sampler, J., Short, J.E (1995)
Strategies
for
Business
Process
Reengineering: Evidence from Field
Studies.
Journal
of
Management
Information Systems, Volume 12, Issue 1,
pp. 31-56
Einhorn, H.J., Hogarth, R.M (1981)
Behavioural Decision Theory: Processes
of Judgment and Choice. Journal of
Accounting Research, Volume 19, Issue 1,
pp. 1-31
Elmisalami, T., Walters, R., Jaselskis, E.J
(2006) Construction IT Decision Making
Using Multiattribute Utility Theory for
Use in a Laboratory Information
Management
System.
Journal
of
Construction Engineering & Management,
Volume 132, Issue 12, December, pp.
1275-1289
El-Banna, M (2013) Patient Discharge
Time Improvement by Using the Six
Sigma Approach: A Case Study. Quality
Engineering, Volume 25, Issue 4,
Oct/Nov, pp. 401-417
Erlang, A.K (1909) The Theory of
Probabilities
and
Telephone
Conversations.
Nyt
Tidsskrift
for
Matematik, Volume 20, No. B, pp. 33-39
Federgruen, A., Groenevelt, H (1988)
M/G/c Queueing Systems With Multiple
Customer Classes: Characterization and
Control of Achievable Performance Under
Nonpreemptive
Priority
Rules.
Management Science, Volume 34, Issue 9,
September, pp. 1121-1138

47. Feinberg, R.A., Kim, I.S., Hokama, L., de


Ruyter, K., Keen, C (2000) Operational
Determinants of Caller Satisfaction in the
Call Center. Journal of Service
Management, Volume 11, Issue 2, pp.
131-141
48. Feldman, Z., Mandelbaum, A (2010)
Using
simulation-based
stochastic
approximation to optimize staffing of
systems
with
skills-based-routing.
WSC10 Proceedings of the Winter
Simulation Conference, pp. 3307-3317
49. Ferreira, D., Mira da Silva, M (2008)
Using process mining for ITIL
assessment: a case study with incident
management. Proceedings of the 13th
Annual
UKAIS
Conference,
Bournemouth University.
50. Fest, G (2008) First-Call Resolution
Becomes Imperative. Bank Technology
News, Volume 12, Issue 8, pp. 1-23
51. Gacenga, F., Cater-Steel, A., Toleman, M
(2010) An International Analysis of IT
Service Management Benefits and
Performance Measurement. Journal of
Global
Information
Technology
Management, Volume 13, Issue 4, pp. 2863
52. Gans, N., Zhow, Y.P (2007) Call-routing
schemes for call-center outsourcing.
Manufacturing & Service Management,
Volume 9, Issue 1, pp. 33-50
53. Garnett, O., Mandelbaum, A (2000) An
Introduction to Skills-Based Routing and
its Operational Complexities. (Teaching
Note) Technion, Isreal.
54. Garnett, O., Mandelbaum, A., Reinman,
M (2002) Designing a Call Center with
Impatient Customers. Manufacturing &
Service Operations Management, Volume
4, Issue 3, pp. 208-227
55. Goh, T.N (2010) Six Triumphs and Six
Tragedies of Six Sigma. Quality
Engineering, Volume 22, Issue 4, pp. 299305
56. Goh, T.N (2012) Sig Sigma at a
crossroads. Current Issues of Business &
Law, Volume 7, Issue 1, pp. 17-26
57. Goldratt, E.M., Cox, J (1984) The Goal: A
Process of Ongoing Improvement. Great
Barrington, MA: The North River Press
58. Green, L.V., Kolesar, P.J., Soares, J
(2003) An Improved Heuristic for Staffing
Telephone Call Centers With Limited
Operating
Hours.
Production
&
Operations Management, Volume 12,
Issue 1, pp. 46-61
59. Gross, D., Shortle, J.F., Thompson, J.M.,
Harris, C.M (2008) Fundamentals of
Queueing Theory 4th Edition. Hoboken,
N.J: John Wiley & Sons.

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

60. Gupta, M.C., Boyd, L.H (2008) Theory of


constraints: a theory for operations
management. International Journal of
Operations & Production Management,
Volume 28, Issue 10, pp. 991-1012
61. Gutierrez, L.J., Bustinza, O.F., Molina,
V.B (2012) Six Sigma, adsorptive
capacity and organizational learning
orientation. International Journal of
Production Research, Volume 50, Issue 3.,
February, pp. 661-675
62. Hammer, M (1990) Reengineering Work:
Dont Automate, Obliterate. Harvard
Business Review, Volume 68, Issue 4,
Jul/Aug, pp. 104-112
63. Harrison, J.M (1988) Brownian models of
queueing networks with heterogeneous
customer populations in Fleming, W H.,
Lions, P.L (Ed) Stochastic Differential
Systems, Stochastic Control Theory and
Applications: The IMA Volumes in
Mathematics and its Applications,
Volume 10. New York: Springer, pp. 147186
64. He, H., Li, Y (2011) Key Service Drivers
for High-Tech Service Brand Equity: The
Mediating Role of Overall Service Quality
and Perceived Value. Journal of
Marketing Management, Volume 27,
Issue 1 and 2, February, pp. 77-99
65. Helber, S., Henken, K (2010) Profitoriented shift scheduling of inbound
contact centers with skills-based routing,
impatient customers, and retrials. OR
Spectrum, Volume 32, Issue 1, pp. 109134
66. Hildebrandt, R (2009) Increasing FirstCall Resolution: Tackling the Challenges
of the Top 10 Agent-Driven Repeat Calls.
Customer Management Insight, January,
pp. 24-25
67. Hochstein, A., Tamm, G., Brenner, W
(2005)
Service-Orientated
IT
Management: Benefit, Cost and Success
Factors. Paper Presented at the 15th
European Conference on Information
Systems, Regensburg, Germany
68. Ignatiadis, I., Nandhakumar, J (2007) The
Impact of Enterprise Systems on
Organizational Resilience. Journal of
Information Technology, Volume 22, pp.
36-43
69. Janz, B.D., Wetherbe, J.C., Davis, G.B.,
Noe, R.A (1997) Reengineering the
Systems Development Process: The Link
Between Autonomous Teams and
Business Process Outcomes. Journal of
Management
Information
Systems,
Volume 14, Issue 1, pp. 41-68
70. Johannsen, F., Leist, S., Zellner, G (2011)
Six Sigma as a business process
management method in services: analysis

71.

72.

73.

74.

75.

76.

77.

78.

79.

80.

10

of the key application problems.


Information Systems & e-Business
Management, Volume 9, Issue 3,
September, pp. 307-332
Jongbloed, G., Koole, G (2001) Managing
Uncertainty in Call Centres Using Poisson
Mixtures. Applied Stochastic Models in
Business and Industry, Volume 17, Issue
4, Oct/Dec, pp. 307-318
Jou, Y.T., Chen, C.H., Hwang, C.H., Lin
W.T., Huang, S.J (2010) A study on the
improvements
of
new
product
development procedure performance-an
application of design for Six Sigma in a
semi-conductor equipment manufacturer.
International Journal of Production
Research, Volume 48, Issue 19, pp. 55735591
Kanagi, K (2012) Assessing the
Relationship
Between
ITIL
Implementation Progress and Firm Size:
Evidence from Malaysia. International
Journal of Business & Management,
Volume 7, Issue 2, January, pp. 194-199
Koole, G., Mandelbaum, A (2002)
Queueing Models of Call Centres: An
Introduction. Annals of Operations
Research, Volume 113, Issue 1-4, pp. 4159
Lau, E.K.W., Chan, W.S (2012) An
Integrative
Framework
Capturing
Customer Satisfaction and Service Quality
in Call Centers. Review of Business
Research, Volume 12, Issue 3, pp. 76-82
Lazarov, A., Shovai (2002) A Rule-Based
System for Automatic Assignment of
Technicians to Service Faults. Decision
Support Systems, Volume 32, Issue 4,
March, pp. 343-360
Long, J (2008) ITIL Version 3 at a
Glance: Information Quick Reference
Guide. New York: Springer.
Lucio-Nieto, T., Colomo-Palacios, R.,
Soto-Acosta, P., Popa, S., Amescua-Seco,
A (2012) Implementing an IT service
information management framework: The
case of COTEMAR. International Journal
of Information Management, Volume 32,
Issue 6, December, pp. 589-594
Mahdi, O.R., Almsafir, M.K (2012)
Diagnosing of Sustainable Competitive
Advantage Using Six Sigma Methodology.
International Journal of Business and
Management, Volume 7, Issue 7, April,
pp. 94-109
Marrone, M., Kolbe, L (2011) Uncovering
ITIL claims: IT executives perception on
benefits and Business-IT alignment.
Information Systems & e-Business
Management, Volume 9, Issue 3,
September, pp. 363-380

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

81. Mazzuchi, T.A., Wallace, R.B (2004)


Analyzing skill-based routing call centers
using discrete-event simulation and design
experiment. WSC 04 Proceedings of the
36th Conference on Winter Simulation, pp.
1812-1820
82. Miguel, M., Ramos, R., Padilla, J (2000)
Implementing Problem Resolution Models
in Remedy. CERN, IT Division, User
Support Group, pp. 1-5
83. Mirani, R., King, W.R (1994) Impacts of
End-User and Information Center
Characteristics on End-User Computing
Support.
Journal
of
Management
Information Systems, Volume 11, Issue 1,
pp. 141-166
84. Nah, J.E., Kim, S (2013) Workforce
planning and deployment for a hospital
reservation call center with abandonment
cost and multiple tasks. Computers &
Industrial Engineering, Volume 65, Issue
2, June, pp. 297-309
85. Naor, M., Bernardes, E.S., Coman, A
(2013) Theory of constraints: is it a theory
and a good one? International Journal of
Production Research, Volume 51, Issue 2,
pp. 542-554
86. Nastase, P., Nastase, F., Ionescu, C (2009)
Challenges
Generated
By
The
Implementation of The IT Standards
COBIT 4.1, ITIL V. 3 and ISO/IEC 27002
In Enterprises. Economic Computation &
Economic
Cybernetics
Studies
&
Research, Volume 43, Issue 3, pp. 1-16
87. Negash, S., Ryan, T., Igbaria, M (2003)
Quality and Effectiveness in Web-based
customer support systems. Information &
Management, Volume 40, Issue 8,
September, pp. 757-769
88. Niessink, F., Van Vliet, H (2000)
Software Maintenance from a Service
Perspective.
Journal
of
Software
Management, Volume 12, Issue 2, pp.
103-120
89. Oglethrope, D., Heron, G (2013) Testing
the theory of constraints in UK local food
supply chains. International Journal of
Operations & Production Management,
Volume 33, Issue 10, pp. 1346-1367
90. Palson, C., Seiditz, D (2000) Customer
Satisfaction At a Software Support Call
Center. Quality Progress, Volume 33,
Issue 6, June, pp. 71-76
91. Pande, P.S., Neuman, R.P., Cavanagh,
R.R (2002) The Six Sigma Way Team
Fieldbook: An Implementation Guide for
Process Improvement Teams. New York:
McGraw-Hill
92. Patterson, E.S., Ebright, P.R., Saleem, J.J
(2011) Investigating Stacking: How do
registered nurses prioritize their activities
in real-time? International Journal of

Industrial Ergonomics, Volume 4, Issue 4,


pp. 389-393
93. Pollard, C., Cater-Steel, A (2009)
Justifications, Strategies, and Critical
Success Factors in Successful ITIL
Implementation in U.S and Australian
Companies: An Exploratory Study.
Information
Systems
Management,
Volume 26, Issue 2, Spring, pp. 164-175
94. Peterson, M (2009) An Introduction to
Decision Theory. Cambridge: Cambridge
University Press.
95. Pyzdek, T., Keller, P (2009) The Six
Sigma Handbook: 3rd Edition. Burr Ridge,
Il: McGraw-Hill Education
96. Ramasubbu, N., Mithas, S., Krishnan,
M.S (2008) High tech, high touch: The
effect of employee skills and customer
heterogeneity on customer satisfaction
with enterprise support services. Decision
Support Systems, Volume 44, Issue 2,
January, pp. 509-523
97. Rapoport, A., Wallsten, T.S (1972)
Individual Decision Behavior. Annual
Review of Psychology, Volume 23, pp.
131-176
98. Resnik, M.D (1987) Choices: An
Introduction
to
Decision
Theory.
Minneapolis: University of Minnesota
Press.
99. Ridley, A.D., Fu, M.C., Massey, W.A
(2003) Customer relations management:
call
center
operations:
fluid
approximations for a priority call center
with time-varying arrivals. Proceedings of
the 35th Conference on Winter
Simulation: Driving Innovation. p p.
1817-1823
100. Sale, M.L., Samual Sale, R (2013) Theory
of Constraints as Related to Improved
Business Unit Performance. Journal of
Accounting and Finance, Volume 13,
Issue 1, pp. 108-114
101. Schwent,
C.R
(1984)
Cognitive
Simplification Processes in Strategic
Decision-Making. Strategic Management
Journal, Volume 5, Issue 2, April/June,
pp. 111-128
102. Shafer, S.M., Moeller, S.B (2012) The
effects of Six Sigma on corporate
performance: An empirical investigation.
Journal of Operations Management,
Volume 30, Issue 7/8, November, pp.
521-532
103. Shah, V., Bandi, R.K (2003) Capability
Development in Knowledge Intensive IT
Enabled Services. European Journal of
Work & Organizational Psychology,
Volume 12, Issue 4, December, pp. 418427
104. Sharifi, M., Ayat, M.Rahman, A.,
Sahibudin, S (2008) Lessons Learned in

11

International Journal of Information Technology and Business Management


29th June 2014. Vol.26 No.1
2012- 2014 JITBM & ARF. All rights reserved

ISSN 2304-0777

www.jitbm.com

ITIL Implementation Failure. Proceedings


of the International Symposium on
Information Technology, Kuala Lumpur,
26th-28th August.
105. Simoudis, E (1992) Using Case-Based
Retrieval for Customer Technical Support.
IEEE Expert, Volume 7, Issue 5, pp. 7-12
106. Sisselman, M.E., Whit, W (2007) ValueBased Routing and Preference-Based
Routing in Customer Contract Centers.
Production & Operations Management,
Volume 16, Issue 3, pp. 277-291
107. Slack, N., Chambers, S., Johnston, R
(2007) Operations Management 4th
Edition. Harlow: Prentice Hall.
108. Spremic, M., Zmirak, Z., Kraljevic, K
(2008) IT and business process
performance management: Case Study of
ITIL implementation in finance service
industry. Proceedings of the 30th
International Conference on Information
Technology Interfaces, Dubrovnik, 2326th June.
109. Stolletz and Helber (2004) Performance
analysis of an inbound call center with
skills based routing: a priority queueing
system with two classes of impatient
customers and heterogeneous agents. OR
Spectrum, Volume 26, pp. 331-352
110. Sunayna (2013) Service Quality Versus
Customer Satisfaction in Banking Sector:
A Literature Review. IUP Journal of
Marketing Management, Volume 12,
Issue 4, November, pp. 65-78
111. Sutherland,
K
(2012)
Service
Management with ITIL. Hoddesdon: DS
Press
112. Tan, W.G., Cater-Steel, A., Toleman, M
(2010)
Implementing
IT
Service
Management: A Case Study Focusing on
Critical Success Factors. Journal of
Computer Information Systems, Volume
50, Issue 2, Winter, pp. 1-12
113. Tang, X., Todo, Y (2013) A Study of
Service Desk Setup in Implementing IT
Service Management in Enterprises.
Technology and Investment, Volume 4,
Issue 3, August, pp. 190-196

114. Tekin, E., Hopp, W.J., Van Oyen, M/P


(2009) Pooling Strategies for Call Center
Agents Cross-Training. IIE Transactions,
Volume 41, Issue 6, June, pp. 546-561
115. Tsou, C.M (2012) On The Project
Management Scheduling Based On Agent
Technology and Theory of Constraint.
International Journal of Electronic
Business Management, Volume 10, Issue
4, pp. 286-295.
116. Van Bon, J., de Jong, A., Kolthof, A.,
Pieper, M., Tjassing, R., van der Veen, A.,
Verheijen, T (2008) Service Operation
based on ITIL V3- A Management Guide.
Zaltbommel: Van Haren Publishing
117. Wallace, R.B., Whitt, W (2005) A
Staffing Algorithm for Call Centres With
Skills-Based Routing. Manufacturing and
Service Operations Management, Volume
7, pp. 276-294
118. Wallace, S (2013) The Complexities of
Convergence: Multiskilled Journalists
Working in BBC Regional Newsrooms.
International Communication Gazette,
Volume 75, Issue 1, February, pp. 99-117
119. Whitt, W (2006) A multi-class fluid
model for a contact center with skill-based
routing. AEU-International Journal of
Electronics and Communications, Volume
60, Issue 2, February, pp. 95-102
120. Yee, R.W.Y., Yeung, A.C.L., Cheng,
T.C.E., Lee, P.K.C (2013) Market
Competitiveness and Quality Performance
in High-Contact Service Industries.
Industrial Management & Data Systems,
Volume 113, Issue 5, pp. 573-588
121. Yuksel, H (2012) Evaluation of the
Success of Six Sigma Projects by Data
Envelopment Analysis. International
Journal of Business & Management,
Volume 7, Issue 13, pp. 75-84
122. Zhaon, J.L, Stohr, E.A (1999) Temporal
Workflow Management in a Claim
Handling System. Proceedings of the
International Joint Conference on Work
Activities Coordination and Collaboration,
pp.
187-195

12

You might also like