{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T18:18:39Z","timestamp":1722968319670},"reference-count":59,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["LHT"],"published-print":{"date-parts":[[2022,12,8]]},"abstract":"Purpose<\/jats:title>Information technology infrastructure library (ITIL) is a commonly utilized IT service management execution technique that helps IT services to be planned, designed, selected, operated and continuously improved. ITIL procedures are utilized to measure the efficiency of IT service management procedures and their association with the accelerated system development of cloud systems. The challenges faced in IT deployment and maintenance management significantly restrict cloud computing services' reliability. Therefore, this article aims to review a comprehensive study of the role of cloud computing on the ITIL processes.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>Each enterprise strives to stay competitive in the market and offers the services its consumers are looking for, all in line with cost-effectiveness and client needs. The ITIL framework provides best practice guidance for IT service management that includes a collection of ample publications supplying detailed guidelines on the management of IT functions, processes, responsibilities and roles associated with IT service management. On the other hand, the way companies employ IT services with an effect on the role of enterprise infrastructure is altered by cloud computing. Hence, the investigation makes utilization of a systematic literature review (SLR) detailing crucial success factors of cloud computing execution in ITIL. The authors have recognized 35 valuable contributions, providing a comprehensive view of study in this field, of which 22 papers were found according to some filters that have been analyzed in this article. Selected articles are presented in two groups, including cloud service and cloud service providers.<\/jats:p><\/jats:sec>Findings<\/jats:title>Owing to the overall expense of execution and problems with combining the ITIL approach with the existing organizational IT strategic strategy, ITIL adoption has begun to wane over the last few years. An established methodology for ITIL deployment that will assure long-term success for those wanting to use private cloud procurement will be the most important inference that can be taken from this article. ITIL offers a perfect platform to execute and support cloud applications effectively. IT will prevent cloud sprawl and instability, reduce the likelihood of service interruption and optimize customer loyalty by merging humans, procedures and technologies into hybrid environments.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>This survey is more aimed at specialists such as IT experts; so, further evaluations must also be carried out in order to understand the company's views on the risks and advantages of adopting ITIL. In addition, non-English articles are not discussed in this article.<\/jats:p><\/jats:sec>Practical implications<\/jats:title>The study outcomes would help suppliers of cloud computing services assess their service quality and ensure customer satisfaction with the quality of cloud computing services. The outcomes will also supply a reference for cloud infrastructure customers to assess and choose various kinds of cloud computing services.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>An SLR with perspectives from ITIL professionals and business studies is the benefit of this report. By offering a more thorough framework that helps companies achieve efficiency, effectiveness and creativity in ITIL execution, this article would be useful for ITIL clients, decision-makers and developers.<\/jats:p><\/jats:sec>","DOI":"10.1108\/lht-01-2021-0031","type":"journal-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T07:55:00Z","timestamp":1625730900000},"page":"1954-1975","source":"Crossref","is-referenced-by-count":22,"title":["A comprehensive study of the role of cloud computing on the information technology infrastructure library (ITIL) processes"],"prefix":"10.1108","volume":"40","author":[{"given":"Dayu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Daojun","family":"Zhong","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6926-8169","authenticated-orcid":false,"given":"Liang","family":"Li","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"issue":"8","key":"key2022120611180027300_ref001","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.2018.1701016","article-title":"SDN-based load balancing service for cloud servers","volume":"56","year":"2018","journal-title":"IEEE Communications Magazine"},{"key":"key2022120611180027300_ref002","volume-title":"Reaching the Adult Learner: Teaching Information Technology Infrastructure Library (ITIL) to Practicing Technology Managers","year":"2012"},{"issue":"5","key":"key2022120611180027300_ref003","doi-asserted-by":"crossref","first-page":"367","DOI":"10.7763\/IJCCE.2014.V3.351","article-title":"The impact of cloud computing on ITIL service strategy processes","volume":"3","year":"2014","journal-title":"International Journal of Computer and Communication Engineering"},{"issue":"2","key":"key2022120611180027300_ref004","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1108\/ITP-03-2019-0119","article-title":"Cloud computing technology adoption: an evaluation of key factors in local governments","volume":"34","year":"2020","journal-title":"Information Technology and People"},{"key":"key2022120611180027300_ref005","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.solener.2018.05.003","article-title":"Risk-assessment of photovoltaic-wind-battery-grid based large industrial consumer using information gap decision theory","volume":"169","year":"2018","journal-title":"Solar Energy"},{"key":"key2022120611180027300_ref006","volume-title":"A Method for Re-using Existing ITIL Processes for Creating an ISO 27001 ISMS Process Applied to a High Availability Video Conferencing Cloud Scenario","year":"2013"},{"issue":"4","key":"key2022120611180027300_ref007","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.jss.2006.07.009","article-title":"Lessons from applying the systematic literature review process within the software engineering domain","volume":"80","year":"2007","journal-title":"Journal of Systems and Software"},{"key":"key2022120611180027300_ref008","volume-title":"IT Service Management: A Guide for ITIL Foundation Exam Candidates","year":"2012"},{"issue":"3","key":"key2022120611180027300_ref009","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10209-017-0559-3","article-title":"Information technology infrastructure library and the migration to cloud computing","volume":"17","year":"2018","journal-title":"Universal Access in the Information Society"},{"key":"key2022120611180027300_ref010","article-title":"Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers","year":"2012"},{"issue":"3","key":"key2022120611180027300_ref011","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1108\/JEIM-06-2019-0148","article-title":"What drives organizations to switch to cloud ERP systems? The impacts of enablers and inhibitors","volume":"33","year":"2020","journal-title":"Journal of Enterprise Information Management"},{"issue":"2","key":"key2022120611180027300_ref012","first-page":"97","article-title":"Evaluation mechanism for service quality of cloud computing based on ITIL","volume":"27","year":"2017","journal-title":"Tai Da Guan Li Lun Cong"},{"key":"key2022120611180027300_ref013","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-12-2019-0401","article-title":"Investigating medical professionals' continuance intention of the cloud-based e-learning system: an extension of expectation\u2013confirmation model with flow theory","year":"2020","journal-title":"Journal of Enterprise Information Management"},{"issue":"3","key":"key2022120611180027300_ref014","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1016\/j.jesit.2017.09.001","article-title":"Cloud computing and trust evaluation: a systematic literature review of the state-of-the-art mechanisms","volume":"5","year":"2018","journal-title":"Journal of Electrical Systems and Information Technology"},{"key":"key2022120611180027300_ref015","article-title":"ITIL compliance with a service perspective: a review based on service-dominant logic","volume-title":"Australasian Conference on Information Systems 2016","year":"2016"},{"key":"key2022120611180027300_ref016","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.csi.2016.05.001","article-title":"Literature review of the situation research faces in the application of ITIL in Small and Medium Enterprises","volume":"48","year":"2016","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"key2022120611180027300_ref017","first-page":"90","article-title":"Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare","volume":"13","year":"2021","journal-title":"Sustainability"},{"issue":"1","key":"key2022120611180027300_ref018","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2005.6","article-title":"Evidence-based software engineering for practitioners","volume":"22","year":"2005","journal-title":"IEEE Software"},{"key":"key2022120611180027300_ref019","article-title":"Quality, Measurement of ITIL processes in cloud systems","year":"2016"},{"issue":"4","key":"key2022120611180027300_ref020","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","article-title":"A framework for ranking of cloud computing services","volume":"29","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"key2022120611180027300_ref021","article-title":"Applying ITIL to cloud operations","volume-title":"Proceedings of International Conference on Advances in Computer Engineering 2011","year":"2011"},{"issue":"7","key":"key2022120611180027300_ref022","first-page":"289","article-title":"Multi-objective task scheduling in cloud computing using an imperialist competitive algorithm","volume":"1","year":"2016","journal-title":"International Journal\u00a0of\u00a0Advanced Computer Science and Applications"},{"issue":"2","key":"key2022120611180027300_ref023","first-page":"111","article-title":"A systematic literature review and meta-analysis on cross project defect prediction","volume":"45","year":"2017","journal-title":"IEEE Transactions on Software Engineering"},{"key":"key2022120611180027300_ref024","volume-title":"IBM Tivoli Storage Manager, Version, 5.1 Technical Guide","year":"2002"},{"key":"key2022120611180027300_ref025","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","article-title":"Secure authentication scheme for IoT and cloud servers","volume":"24","year":"2015","journal-title":"Pervasive and Mobile Computing"},{"key":"key2022120611180027300_ref026","article-title":"Towards cloud computing management model based on ITIL processes","year":"2018"},{"key":"key2022120611180027300_ref027","first-page":"17","article-title":"Itil as a framework for management OF cloud services","volume":"3","year":"2014","journal-title":"International Journal of Research in Engineering and Technology"},{"key":"key2022120611180027300_ref028","volume-title":"Application Blueprint and Deployment Model for Dynamic Business Service Management (BSM)","year":"2017"},{"key":"key2022120611180027300_ref029","volume-title":"Understanding Cloud Computing Success and its Impact on Firm Performance: An Integrated Approach","year":"2020"},{"key":"key2022120611180027300_ref030","volume-title":"Procedures for Performing Systematic Reviews","year":"2004"},{"key":"key2022120611180027300_ref031","volume-title":"Procedures For Undertaking Systematic Reviews: Joint Technical Report","year":"2004"},{"key":"key2022120611180027300_ref032","volume-title":"Guidelines for Performing Systematic Literature Reviews in Software Engineering","year":"2007"},{"key":"key2022120611180027300_ref033","article-title":"Evidence-based software engineering","year":"2004"},{"issue":"1","key":"key2022120611180027300_ref034","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature reviews in software engineering\u2013a systematic literature review","volume":"51","year":"2009","journal-title":"Information and Software Technology"},{"key":"key2022120611180027300_ref035","volume-title":"A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions","year":"2019"},{"key":"key2022120611180027300_ref036","volume-title":"Theory, Supporting Technology and Application Analysis of Cloud Manufacturing: A Systematic and Comprehensive Literature Review","year":"2020"},{"key":"key2022120611180027300_ref037","doi-asserted-by":"crossref","first-page":"101057","DOI":"10.1016\/j.est.2019.101057","article-title":"An IGDT-based risk-involved optimal bidding strategy for hydrogen storage-based intelligent parking lot of electric vehicles","volume":"27","year":"2020","journal-title":"Journal of Energy Storage"},{"key":"key2022120611180027300_ref038","volume-title":"ITIL Processes to Control Operational Risk in Cloud Architecture Infrastructure for Banking and Financial Services Industry","year":"2018"},{"key":"key2022120611180027300_ref039","article-title":"An it infrastructure library (ITIL) maturity strategy for private cloud sourcing models: a literature review and research methodology formation","volume":"2013","year":"2013","journal-title":"ISICO 2013"},{"key":"key2022120611180027300_ref040","article-title":"Towards understanding organisational culture contradictions between organisations and the Information Technology Infrastructure Library (ITIL) framework: a review of the literature","year":"2015"},{"key":"key2022120611180027300_ref041","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.compind.2014.12.007","article-title":"Behavioral modeling and automated verification of a Cloud-based framework to share the knowledge and skills of human resources","volume":"68","year":"2015","journal-title":"Computers in Industry"},{"key":"key2022120611180027300_ref042","doi-asserted-by":"crossref","first-page":"105952","DOI":"10.1016\/j.epsr.2019.105952","article-title":"Reliability based optimal allocation of distributed generations in transmission systems under demand response program","volume":"176","year":"2019","journal-title":"Electric Power Systems Research"},{"key":"key2022120611180027300_ref043","article-title":"Job Scheduling in the Expert Cloud Based on Genetic Algorithms","year":"2014"},{"issue":"5","key":"key2022120611180027300_ref044","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1108\/BPMJ-03-2019-0134","article-title":"Smart production systems drivers for business process management improvement","volume":"26","year":"2020","journal-title":"Business Process Management Journal"},{"key":"key2022120611180027300_ref045","article-title":"A literature review about sequencing ITIL processes","year":"2018"},{"key":"key2022120611180027300_ref046","volume-title":"Google Drive, Dropbox, Box and iCloud Reach the Top 5 Cloud Storage Security Breaches List: Nov","year":"2014"},{"issue":"2","key":"key2022120611180027300_ref047","first-page":"pp190","article-title":"Resolving cloud computing security issues using ITIL security management process","volume":"2","year":"2011","journal-title":"Journal of Applied and Emerging Sciences"},{"key":"key2022120611180027300_ref048","first-page":"1","article-title":"Portfolio-driven resource management for transient cloud servers","year":"2017"},{"key":"key2022120611180027300_ref049","article-title":"Instructor led training and certification-ITIL V4 foundation","year":"2020"},{"issue":"3","key":"key2022120611180027300_ref050","first-page":"4","article-title":"Implementing cloud computing in small and mid-market life-sciences","volume":"22","year":"2013","journal-title":"Journal of International Technology and Information Management"},{"issue":"4","key":"key2022120611180027300_ref051","doi-asserted-by":"crossref","first-page":"2453","DOI":"10.1007\/s10586-019-03018-9","article-title":"A hybrid formal verification approach for QoS-aware multi-cloud service composition","volume":"23","year":"2020","journal-title":"Cluster Computing"},{"key":"key2022120611180027300_ref052","volume-title":"Cocreation and Implementing ITIL Service Management in the Cloud: A Case Study","year":"2014"},{"key":"key2022120611180027300_ref053","volume-title":"Information Technology Service Performance Management Using COBIT and an ITIL Framework: A Systematic Literature Review","year":"2017"},{"key":"key2022120611180027300_ref054","first-page":"408","article-title":"Measuring return on investment from implementing ITIL: a review of the literature","year":"2009","journal-title":"Information Technology Governance and Service Management: Frameworks and Adaptations"},{"issue":"5","key":"key2022120611180027300_ref055","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","article-title":"Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers","volume":"30","year":"2011","journal-title":"Computers and Security"},{"issue":"1","key":"key2022120611180027300_ref056","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1108\/ITP-01-2018-0047","article-title":"The dual roles of the government in cloud computing assimilation: an empirical study in China","volume":"32","year":"2019","journal-title":"Information Technology and People"},{"issue":"17","key":"key2022120611180027300_ref057","doi-asserted-by":"crossref","first-page":"3478","DOI":"10.1049\/iet-gtd.2019.1625","article-title":"Probabilistic decomposition-based security constrained transmission expansion planning incorporating distributed series reactor","volume":"14","year":"2020","journal-title":"IET Generation, Transmission and Distribution"},{"key":"key2022120611180027300_ref058","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1007\/978-3-642-41674-3_153","article-title":"The operation and maintenance management system of the cloud computing data center based on ITIL","volume":"279","year":"2014","journal-title":"Advances in Computer Science and Its Applications"},{"key":"key2022120611180027300_ref059","volume-title":"A Cloud Data Center Operation and Maintenance Management Process for the Research Institution Based on Improved ITIL","year":"2016"}],"container-title":["Library Hi Tech"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-01-2021-0031\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-01-2021-0031\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,6]],"date-time":"2022-12-06T12:26:29Z","timestamp":1670329589000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/LHT-01-2021-0031\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,9]]},"references-count":59,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2021,7,9]]},"published-print":{"date-parts":[[2022,12,8]]}},"alternative-id":["10.1108\/LHT-01-2021-0031"],"URL":"https:\/\/doi.org\/10.1108\/lht-01-2021-0031","relation":{},"ISSN":["0737-8831"],"issn-type":[{"value":"0737-8831","type":"print"}],"subject":[],"published":{"date-parts":[[2021,7,9]]}}}