Bon Frameworks for IT Management
1. Auflage 2006
ISBN: 978-90-8753-193-5
Verlag: Van Haren Publishing
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 278 Seiten
ISBN: 978-90-8753-193-5
Verlag: Van Haren Publishing
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
An independent and vendor neutral guide to the wide range of management frameworks which are now available, and of particular relevance to IT service managers. Written by well known experts in each field, this new publication focuses on explaining the potential value and characteristics of each of these instruments in a clear and structured manner.
By this book is a separate (free, via internet) available:
• All images in the book, in Powerpoint format. Click on the button Training Material by the book on our website.
Autoren/Hrsg.
Weitere Infos & Material
1;Foreword;6
2;Endorsement Statement;7
3;Acknowledgements;8
4;Introduction;20
5;1 TQM - Total Quality Management;28
5.1;1.1 Origin/history;28
5.2;1.2 Where is TQM used?;31
5.3;1.3 Description;31
5.4;1.4 Approach/how to;32
5.5;1.5 Relevance to IT management;34
5.6;1.6 Strengths and weaknesses;34
5.7;1.7 Cross-references/relationships;35
5.8;1.8 Links and literature;36
6;2 ISO 9000 - Quality Management Systems;38
6.1;2.1 Origin/history;38
6.2;2.2 Where is ISO 9000 used?;39
6.3;2.3 Description and core graphics;41
6.4;2.4 Approach/how to;42
6.5;2.5 Relevance to IT management;44
6.6;2.6 Strengths and weaknesses;44
6.7;2.7 Cross-references/relationships;45
6.8;2.8 Links and literature;46
7;3 TickIT - Software Quality Management;48
7.1;3.1 Origin/history;48
7.2;3.2 Where is TickIT used?;49
7.3;3.3 Description and core graphics;49
7.4;3.4 Approach/how to;50
7.5;3.5 Relevance to IT management;50
7.6;3.6 Strengths and weaknesses;51
7.7;3.7 Cross-references/relationships;52
7.8;3.8 Links and literature;52
8;4 ISO 27001 - Information Security Management Systems;54
8.1;4.1 Origin/history;54
8.2;4.2 Where is ISO 27001 used?;55
8.3;4.3 Description and core graphics;55
8.4;4.4 Approach/how to;55
8.5;4.5 Relevance to IT management;62
8.6;4.6 Strengths and weaknesses;62
8.7;4.7 Cross-references/relationships;63
8.8;4.8 Links and literature;63
9;5 ISO/IEC 20000 - ITSM Standard;64
9.1;5.1 Origin/history;64
9.2;5.2 Where is ISO/IEC 20000 used?;65
9.3;5.3 Description and core graphics;65
9.4;5.4 Approach/how to;69
9.5;5.5 Relevance to IT management;69
9.6;5.6 Strengths and weaknesses;69
9.7;5.7 Cross-references/relationships;70
9.8;5.8 Links and literature;70
10;6 IT Service CMM - the IT ServiceCapability Maturity Model;72
10.1;6.1 Origin/history;72
10.2;6.2 Where is the IT Service CMM used?;73
10.3;6.3 Description and core graphics;73
10.4;6.4 Approach/how to;77
10.5;6.5 Relevance to IT management;77
10.6;6.6 Strengths and weaknesses;77
10.7;6.7 Cross-references/relationships;77
10.8;6.8 Links and literature;78
11;7 Six Sigma;80
11.1;7.1 Origin/history;80
11.2;7.2 Where is the Six Sigma methodology used?;81
11.3;7.3 Description and core graphics;82
11.4;7.4 Approach/how to;84
11.5;7.5 Relevance to IT management;87
11.6;7.6 Strengths and weaknesses;87
11.7;7.7 Cross-references/relationships;88
11.8;7.8 Links and literature;90
12;8 eSCM-SP v2: eSourcing Capability Model for Service Providers, Version 2;92
12.1;8.1 Origin/history;92
12.2;8.2 Where is eSCM-SP v2 used?;93
12.3;8.3 Description and core graphics;94
12.4;8.4 Approach/how to;97
12.5;8.5 Relevance to IT management;98
12.6;8.6 Strengths and weaknesses;99
12.7;8.7 Cross-references/relationships;99
12.8;8.8 Links and literature;100
13;9 IT Balanced Scorecard;102
13.1;9.1 Origin/history;102
13.2;9.2 Where is the IT Balanced Scorecard used?;102
13.3;9.3 Description and core graphics;103
13.4;9.4 Approach/how to;108
13.5;9.5 Relevance to IT management;109
13.6;9.6 Strengths and weaknesses;110
13.7;9.7 Cross-references/relationships;110
13.8;9.8 Links and literature;112
14;10 AS 8015-2005 - Australian Standard for Corporate Governance of IT;114
14.1;10.1 Origin/history;115
14.2;10.2 Where is AS 8015 used?;116
14.3;10.3 Description and core graphics;117
14.4;10.4 Approach/how to;118
14.5;10.5 Relevance to IT management;120
14.6;10.6 Strengths and weaknesses;120
14.7;10.7 Cross-references/relationships;120
14.8;10.8 Links and literature;121
15;11 COBIT – Control Objectives for Information and related Technology;122
15.1;11.1 Origin/history;122
15.2;11.2 Where is COBIT used?;123
15.3;11.3 Description and core graphics;124
15.4;11.4 Approach/how to;128
15.5;11.5 Relevance to IT management;129
15.6;11.6 Strengths and weaknesses;129
15.7;11.7 Cross-reference/relationships;130
15.8;11.8 Links and literature;131
16;12 M_o_R – Management of Risk;134
16.1;12.1 Origin/history;134
16.2;12.2 Where is Management of Risk used?;134
16.3;12.3 Description and core graphics;135
16.4;12.4 Approach/how to;136
16.5;12.5 Relevance to IT management;136
16.6;12.6 Strengths and weaknesses;137
16.7;12.7 Cross-reference/relationships;137
16.8;12.8 Links and literature;137
17;13 Generic Framework for Information Management;140
17.1;13.1 Origin/history;140
17.2;13.2 Where is the Generic Framework for Information Management used?;140
17.3;13.3 Description and core graphics;141
17.4;13.4 Approach/how to;143
17.5;13.5 Relevance to IT management;144
17.6;13.6 Strengths and weaknesses;146
17.7;13.7 Cross-references/relationships;146
17.8;13.8 Links and literature;149
18;14 BiSL – Business Information Services Library;152
18.1;14.1 Origin/history;153
18.2;14.2 Where is BiSL used?;153
18.3;14.3 Description and core graphics;154
18.4;14.4 Approach/how to;156
18.5;14.5 Relevance to IT management;157
18.6;14.6 Strengths and weaknesses;157
18.7;14.7 Cross-references/relationships;158
18.8;14.8 Links and literature;159
19;15 ISPL - the Information Services Procurement Library;160
19.1;15.1 Origin/history;160
19.2;15.2 Where is ISPL used?;161
19.3;15.3 Description and core graphics;161
19.4;15.4 Approach/how to;165
19.5;15.5 Relevance to IT management;165
19.6;15.6 Strengths and weaknesses;165
19.7;15.7 Cross-references/relationships;166
19.8;15.8 Links and literature;167
20;16 ITIL - the IT Infrastructure Library;168
20.1;16.1 Origin/history;168
20.2;16.2 Where is ITIL used?;168
20.3;16.3 Description and core graphics;169
20.4;16.4 Approach/how to;170
20.5;16.5 Relevance to IT management;177
20.6;16.6 Strengths and weaknesses;178
20.7;16.7 Cross-references/relationships;178
20.8;16.8 Links and literature;179
21;17 eTOM – the Enhanced Telecom Operations Map;180
21.1;17.1 Origin/history;180
21.2;17.2 Where is eTOM used?;181
21.3;17.3 Description and core graphics;182
21.4;17.4 Approach/how to;184
21.5;17.5 Relevance to IT management;185
21.6;17.6 Strengths and weaknesses;186
21.7;17.7 Cross-references/relationships;186
21.8;17.8 Links and literature;188
22;18 ASL – Application Services Library;190
22.1;18.1 Origin/history;190
22.2;18.2 Where is ASL used?;191
22.3;18.3 Description and core graphics;191
22.4;18.4 Approach/how to;195
22.5;18.5 Relevance to IT management;196
22.6;18.6 Strengths and weaknesses;196
22.7;18.7 Cross-references/relationships;196
22.8;18.8 Links and literature;198
23;19 MSP – Managing Successful Programmes;200
23.1;19.1 Origin/history;200
23.2;19.2 Where is MSP used?;201
23.3;19.3 Description and core graphics;202
23.4;19.4 Approach/how to;208
23.5;19.5 Relevance to IT management;209
23.6;19.6 Strengths and weaknesses;209
23.7;19.7 Cross-references/relationships;210
23.8;19.8 Links and literature;210
24;20 PRINCE2 - PRojects IN Controlled Environments;212
24.1;20.1 Origin/history;212
24.2;20.2 Where is PRINCE2 used?;213
24.3;20.3 Description and core graphics;213
24.4;20.4 Approach/how to;220
24.5;20.5 Relevance to IT management;220
24.6;20.6 Strengths and weaknesses;221
24.7;20.7 Cross-references/relationships;221
24.8;20.8 Links and literature;223
25;21 PMBoK – the Project Management Body of Knowledge;224
25.1;21.1 Origin/history;225
25.2;21.2 Where is the PMBoK used?;225
25.3;21.3 Description and core graphics;227
25.4;21.4 Approach/how to;231
25.5;21.5 Relevance to IT management;232
25.6;21.6 Strengths and weaknesses;234
25.7;21.7 Cross-references/relationships;234
25.8;21.8 Links and literature;235
25.9;21.9 Acronyms;236
26;22 ICB – IPMA Competence Baseline;238
26.1;22.1 Origin/history;238
26.2;22.2 Where is the IPMA Competence Baseline used?;239
26.3;22.3 Description and core graphics;239
26.4;22.4 Approach/how to;243
26.5;22.5 Relevance to IT management;243
26.6;22.6 Strengths and weaknesses;243
26.7;22.7 Cross-references/relationships;244
26.8;22.8 Links and literature;245




