tag:blogger.com,1999:blog-59412724301686259812024-02-08T08:07:55.481-08:00IT Service ManagementUnknownnoreply@blogger.comBlogger9125tag:blogger.com,1999:blog-5941272430168625981.post-2083139636328963562010-11-14T14:01:00.000-08:002010-11-14T14:02:05.049-08:0021st Annual IIMA Conference – “Creating new opportunities- The role of information in sustainable innovation”<!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin-top:0cm; mso-para-margin-right:0cm; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0cm; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} </style> <![endif]--> <p class="MsoNormal" style="margin: 6pt 0cm; line-height: normal;">The 21th <a href="http://www.iima.org/">Annual IIMA Conference</a> took place in Utrecht, The Netherlands from 17 – 20 October 2010. </p> <p class="MsoNormal" style="margin: 6pt 0cm; text-align: justify; line-height: normal;">The<span style=""> </span>International<span style=""> </span>Information<span style=""> </span>Management<span style=""> </span>Association<span style=""> </span>(IIMA)<span style=""> </span>annual<span style=""> </span>conferences<span style=""> </span>promote<span style=""> </span>the<span style=""> </span>dynamic<span style=""> </span>exchange of ideas among leading researchers, educators, developers and practitioners who share their research and disseminate innovations in education, business and government. The <a href="http://www.iima.org/index.php?option=com_content&view=article&id=82&Itemid=76">21<sup>st</sup><span style=""> </span>Annual Conference of the IIMA</a> was<span style=""> </span>devoted<span style=""> </span>to<span style=""> </span>presenting<span style=""> </span>and<span style=""> </span>examining<span style=""> </span>information technology<span style=""> </span>issues<span style=""> </span>that<span style=""> </span>create<span style=""> </span>new<span style=""> </span>innovative<span style=""> </span>and sustainable opportunities in our current economical climate.<span style=""> </span>Master and PhD-students were <a href="https://docs.google.com/viewer?a=v&pid=explorer&chrome=true&srcid=0BzxaQvNNf9UlY2I3NzQzN2ItZmFhNC00NTgzLTkzNDEtNDE1YmFkODI4Y2Nl&hl=en&authkey=CMHiv8MG">invited to apply</a> for the <a href="http://www.iima.org/index.php?option=com_content&view=article&id=81&Itemid=73">Student Consortium</a> of the 21st IIMA. With the application students were required to submit a paper describing their research approach and results, and to participate on workshop on performing design research. Workshop discussions were centered on research triggers, research questions, design artifacts and validation.<span style="background: none repeat scroll 0% 0% yellow;"></span></p> <p class="MsoNormal" style="margin: 6pt 0cm; text-align: justify; line-height: normal;">The conference was remarkable, the keynote speakers were outstanding, the researchers and presenters very innovative and practical, the topics were current and tangible, the workshop was concrete and practical, excellent information sharing and knowledge transfer through the student panel.</p> <p class="MsoNormal" style="margin: 6pt 0cm; text-align: justify; line-height: normal;">Me and my colleagues from the e-Business Management Master studies conducted a research and prepared a research paper on topic “Increasing Trust towards Government e-Services” which was presented on the conference as part of the Student consortium. We also took active participation in the student assignments during the conference and discussions of the Student Consortium panel.</p> <p class="MsoNormal" style="text-align: justify;">Utrecht is incredibly delightful and charming city. The organized tour through Utrecht – <a href="http://www.trajectumlumen.nl/">Trajectum lumen</a> was unforgettable, very creative and arty. I highly recommend visiting Utrecht, preferably in spring or summer :), also very close are Amsterdam, Den Hag that are worth visiting.</p> <p class="MsoNormal" style="margin: 6pt 0cm; line-height: normal;"><a href="http://picasaweb.google.com/trajkovski.partners/IIMA2010Conference">Photos</a> from the conference, <a href="http://twitter.com/#%21/IIMA_2010">Tweeter account</a> of the conference, the <a href="https://docs.google.com/viewer?a=v&pid=explorer&chrome=true&srcid=0BzxaQvNNf9UlYmNjMjI0MWItODliZC00YTY3LWExOWEtOTI0NzdjMThhZDBi&hl=en&authkey=CI_k2uwN">program of the conference</a>, the <a href="https://docs.google.com/leaf?id=0BzxaQvNNf9UlNWIyZjFhYjItYjYxMS00MzBhLTkzOWQtMWJkZjVjMTUzNWM1&hl=en">certificate</a>.</p>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5941272430168625981.post-7858196241426705722010-11-14T13:30:00.001-08:002010-11-14T13:46:08.462-08:0023rd Bled eConference - “eTrust: Implications for the Individual, Enterprises and Society"The <a href="http://www.bledconference.org/index.php/eConference/2011/search/schedConfs">23rd Bled eConference</a> on topic eTrust: Implications for the Individual, Enterprises and Society was held in Bled - Slovenia in the period of 20th – 23rd June 2010. <a href="http://bledconference.org/index.php/eConference/2010/schedConf/program">The program of the conference</a>.<br /><br />Bled eConference attracts speakers and delegates from business, government, information technology providers and universities and is the major venue for researchers working in all aspects of “e”. The conference has a wide appeal, offering:<br /><ul><li>A fully-refereed Research Track, devoted to researchers in all aspects of "e";</li><li>A Business and Government Panel Track which attracts eminent business and government leaders from Europe, the Americas and Asia-Pacific;</li><li>Business, Government and Academic Meetings offering unparalleled opportunities to think and share with colleagues from around the world.</li></ul>In conjunction with the 23rd <a href="http://bledconference.org/">Bled eConference</a> the Faculty of Organizational Sciences University of Maribor, situated in Kranj organized <a href="http://fov.uni-mb.si/Study/Summer-School/2010">Summer school</a>, starting from 14th to 20th June 2010.<br /><br />The summer school program covered various topics of innovative business operation and management, supported by modern information and communication technologies. Summer school was organized into the lectures combined with hands-on experiences, using information and communication technologies in the computer classroom. <a href="http://fov.uni-mb.si/Study/Summer-School/2010/schedule">Summer School Schedule.</a><br /><br />Both the Summer School and the <a href="http://www.facebook.com/pages/Bled-Slovenia/Bled-eConference/208433354714">eConference</a> were excellent, with reach content and knowledge transfer, interactive sessions, practical workshops and simulations, remarkable speakers and intensive networking. I highly recommend this conference for all who want to upgrade themselves on professional, as well as personal level.<br /><br />I took active participation on the summer school and the conference together with my colleagues from the<a href="http://www.eccf.ukim.edu.mk/study/studies/postgraduate/19"> eBusiness master studies</a>. We followed the one week <a href="https://docs.google.com/leaf?id=0BzxaQvNNf9UlMjhlNjliNjAtNDEzZC00NTI2LWI2NmQtOWRlZmI3NGNlYWMw&hl=en">summer school programme</a>, we participated in the <a href="http://www.bledconference.org/public/conferences/2/program/BusinessTrack/Workshops/ACEM.htm">6th International Academic Electronic Marketplace Council (ACEM) Workshop in corporation with the 1st International eMarketplace Simulations</a>, and we presented our prototype on the <a href="http://www.bledconference.org/public/conferences/2/program/ResearchTrack/ePrototype_Bazaar.htm">Professor René W. Wagenaar ePrototype Bazaar</a>.<br /><br />The organized social events are great, as well as the networking during the conference, but also it is very easy to organize yourself a joyful time because the nature in Bled is outstanding, and very close are Ljubljana, Postojna, Bohinj, Potroroz (not so close but worth every km traveled, especially on sunny weather :))<br /><br />The<a href="http://www.flickr.com/photos/bledconference"> official photos</a> from the Bled eConference and <a href="http://picasaweb.google.com/trajkovski.partners/23rdBledEConferenceAndSummerSchool">my photos</a> from the conference and summer school.<br /><br />The next, <a href="http://www.bledconference.org/index.php/eConference/2011/search/schedConfs">24th Bled eConference</a> will be on topic eFuture: Solutions for the Individual, Organisations and Society and is announced for 12th – 15th June 2011. For more information on Call for Papers and Proposals <a href="http://www.bledconference.org/index.php/eConference/2011/schedConf/cfp">click here</a>.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5941272430168625981.post-13993117854717849452010-04-29T02:06:00.001-07:002010-04-29T05:00:27.189-07:00itSMF Macedonia - Free Discussion Event (FDE)<span style="font-family:arial;">The new cycle of FDE organized by itSMF Macedonia started this month. The purpose of these FDEs, that are regularly organized third year in a row, is exchange of experiences in the area of It Service Management through free and open discussions.</span><br /><span style="font-family:arial;"><br />The FDE was held on 27th April 2010, in the MIT University. The topic of this event was “Service desks in Macedonian organizations” and realistic practical cases were presented by Nextsense (Daniela Gavrilovska), NBRM (Natasa Kostic), Neokom (Milan Temelkovski, Bijlana Petrovska).</span><br /><span style="font-family:arial;"><br />For more information on the itSMF Free Discussion Events, new FDEs, presentations from the FDEs and other details visit the<a href="http://www.itsmf.org.mk/"> itSMF Macedonia’s website</a>.</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5941272430168625981.post-8111806517436526712010-02-19T07:00:00.000-08:002010-02-21T07:20:32.495-08:00Information Security<script type="text/javascript"><br />var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");<br />document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));<br /></script><br /><script type="text/javascript"><br />try {<br />var pageTracker = _gat._getTracker("UA-13138278-1");<br />pageTracker._trackPageview();<br />} catch(err) {}</script><br /><br />Living in today’s modern age of information technologies, we become more and more aware about the importance of the information security.<br />The aspect of information security is very important for the business community as well as for the individuals. Due to this lately more attention is focused to this subject worldwide, as well as in Macedonia.<br />I will try to explain what does information security means and why it is so important through few basic definitions and short presentations.<br /><br /><span style="font-weight: bold;">What is information? </span><br />"Information is a means of organization, which like all other business assets, has value to the organization and therefore need to be adequately protected"<br /><br /><span style="font-weight: bold;">What is information security? </span><br />Provision of confidentiality, integrity and availability of written, electronic and spoken information.<br /><br /><ul><li>Confidentiality - Ensuring that information is available only to those authorized to have access </li><li>Integrity - Ensuring the accuracy and completeness of the information and methods for their processing </li><li>Availability - Ensuring that authorized users have access to information and related resources when needed </li></ul><br />There are several international standards and best practices that have incorporated the aspect of information security in them. I would point out the following:<br /><ul><li>ISO 27001 Management Security Information </li><li>ISO 20000 IT service management </li><li>ITIL - Information Technology Infrastructure Library</li></ul>More details on types of information, systems for information security, common threats to information, etc. in the enclosed presentations.<br /><br /><span style="font-weight: bold; color: rgb(102, 51, 51);">The notion information and basic types of information</span><br /><div style="width:425px;text-align:left" id="__ss_3112093"><a style="font:14px Helvetica,Arial,Sans-serif;display:block;margin:12px 0 3px 0;text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska/1-the-notion-information-and-basic-types-of-information" title="1 The Notion Information And Basic Types Of Information">1 The Notion Information And Basic Types Of Information</a><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=1thenotioninformationandbasictypesofinformation-100209055119-phpapp02&stripped_title=1-the-notion-information-and-basic-types-of-information" /><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=1thenotioninformationandbasictypesofinformation-100209055119-phpapp02&stripped_title=1-the-notion-information-and-basic-types-of-information" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;">View more <a style="text-decoration:underline;" href="http://www.slideshare.net/">presentations</a> from <a style="text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a>.</div></div><br /><br /><span style="font-weight: bold; color: rgb(102, 51, 51);">Most common threats of information security</span><br /><div style="width:425px;text-align:left" id="__ss_3112090"><a style="font:14px Helvetica,Arial,Sans-serif;display:block;margin:12px 0 3px 0;text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska/3-most-common-threats-of-information-security" title="3 Most Common Threats Of Information Security">3 Most Common Threats Of Information Security</a><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=3mostcommonthreatsofinformationsecurity-100209055126-phpapp02&stripped_title=3-most-common-threats-of-information-security" /><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=3mostcommonthreatsofinformationsecurity-100209055126-phpapp02&stripped_title=3-most-common-threats-of-information-security" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;">View more <a style="text-decoration:underline;" href="http://www.slideshare.net/">presentations</a> from <a style="text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a>.</div></div><br /><br /><span style="font-weight: bold; color: rgb(102, 51, 51);">System for information security</span><br /><div style="width:425px;text-align:left" id="__ss_3112092"><a style="font:14px Helvetica,Arial,Sans-serif;display:block;margin:12px 0 3px 0;text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska/4-system-for-information-security" title="4 System For Information Security">4 System For Information Security</a><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=4systemforinformationsecurity-100209055134-phpapp02&stripped_title=4-system-for-information-security" /><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=4systemforinformationsecurity-100209055134-phpapp02&stripped_title=4-system-for-information-security" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;">View more <a style="text-decoration:underline;" href="http://www.slideshare.net/">presentations</a> from <a style="text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a>.</div></div><br /><br /><span style="font-weight: bold; color: rgb(102, 51, 51);">Standards and recommendations for information security on internet</span><br /><div style="width:425px;text-align:left" id="__ss_3112089"><a style="font:14px Helvetica,Arial,Sans-serif;display:block;margin:12px 0 3px 0;text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska/5-standards-and-recommendations-for-information-security-on-internet" title="5 Standards And Recommendations For Information Security On Internet">5 Standards And Recommendations For Information Security On Internet</a><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=5standardsandrecommendationsforinformationsecurityoninternet-100209055116-phpapp01&stripped_title=5-standards-and-recommendations-for-information-security-on-internet" /><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=5standardsandrecommendationsforinformationsecurityoninternet-100209055116-phpapp01&stripped_title=5-standards-and-recommendations-for-information-security-on-internet" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;">View more <a style="text-decoration:underline;" href="http://www.slideshare.net/">presentations</a> from <a style="text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a>.</div></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5941272430168625981.post-91721665779955541752009-12-01T02:28:00.000-08:002009-12-01T02:35:29.385-08:00NBRM's Decisionas for ISO 20000In the beginning of 2008, the National Bank of Republic of Macedonia (<a href="http://www.nbrm.gov.mk/default-en.asp?ItemID=41989BA5CE65DA48AC1B50206D0DE89D">NBRM</a>) brought <a href="http://www.nbrm.gov.mk/WBStorage/Files/IT%20security.pdf">Decision on the bank's information system security</a> ("Official Gazette of the Republic of Macedonia" No. 31/2008).<br /><br />In this decision NBRM prescribed the methodology for information security of the banks taking into consideration the processes for managing the security of the information system, business continuity, e-banking security standards etc.<br /><br />In June 2008 NBRM brought <a href="http://www.nbrm.gov.mk/WBStorage/Files/ITSystemSecurity-amendment-2%2009%202008TrackChanges.pdf">Decision on amending the Decision on the bank's information system security</a> ("Official Gazette of RM" No. 78/08). With this amendment NBRM prescribed that the IT suppliers of the banks (outsourcing companies) must be ISO 20000 IT Service Management certified.<br /><br /><blockquote>"The outsourcing company* under paragraph 1 of this item shall obligatorily be certified in accordance with the international standard ISO/IEC 20000.<br />* Outsourcing company shall denote a company, which on the basis of a written agreement, provides services to the bank from the information system area for processing bank and financial activities.“ (based on the decision from 2008)”</blockquote><br /><br />In the beginning of 2009 NBRM brought another <a href="http://www.nbrm.gov.mk/WBStorage/Files/ITSystemSecurity-amendment-6%2003%2009.pdf">Decision on amending and consolidating the Decision on the bank's information system security</a> ("Official Gazette of the Republic of Macedonia" No. 31/2009) in which there are clarifications for which IT providers of the banks are included in the category of companies that should be ISO 20000 certified.<br /><br /><blockquote>„Information system services undertaking of a bank according to this Decision, shall denote:<br />a) ancillary services undertaking of a bank whose prevailing activity is managing and maintaining a data processing system, and which, on the basis of a written agreement processes and stores bank's data during the conduct of banking and financial activities; and/or <br />b) outsourcing, which, on the basis of a written agreement processes and stores bank's data during the conduct of banking and financial activities."</blockquote><br /><br />These NBRM’s <a href="http://www.nbrm.gov.mk/default-en.asp?ItemID=D5F48192FEED1844AC96A96BB52B373A">decisions </a>made ISO 20000 very relevant topic in Macedonia, especially among IT companies.<br /><br />The card processing center <a href="http://casys.com.mk/index.php?language=38">CaSys </a>first demonstrated alignment to the NBRM’s requirements or more precisely the requirements of their clients, through successful certification of IT Service Management System based on ISO 20000:2005. With this CaSys became the first company in Macedonia and the region to be <a href="http://casys.com.mk/data/files/Casys_ISO20000_cert_en.pdf">ISO 20000 certified</a>. This news was published by Kapital, <a href="http://www.makfax.com.mk/_tools/search#_tools/article/90507/view">Makfax </a>etc.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5941272430168625981.post-90622409791631965222009-11-27T07:43:00.000-08:002009-11-27T07:52:48.026-08:00Description of ISO 20000 series of standards<span style="font-family: arial;">Effective service management delivers high levels of customer service and customer satisfaction. It also recognizes that services and service management are essential to helping organizations generate revenue and be cost-effective. The ISO/IEC 20000 series enables service providers to understand how to enhance the quality of service delivered to their customers, both internal and external.</span><br /><span style="font-family: arial;">The ISO/IEC 20000 series applies to both large and small service providers, and the requirements for best practice service management processes are independent of the service provider's organizational form. These service management processes deliver the best possible service to meet a customer's business needs within agreed resource levels, i.e. service that is professional, cost-effective and with risks which are understood and managed.</span><br /><br /><span style="font-family: arial; font-weight: bold; font-style: italic; color: rgb(102, 0, 0);">ISO/IEC 20000-1</span><br /><span style="font-family: arial;">ISO/IEC 20000-1 defines the requirements for a service provider to deliver managed services. It promotes the adoption of an integrated process approach to effectively deliver managed services to meet business and customer requirements. For an organization to function effectively it has to identify and manage numerous linked activities. Coordinated integration and implementation of the service management processes provides the ongoing control, greater efficiency and opportunities for continual improvement. </span><br /><span style="font-family: arial;">This is the standard against an organization is being certified.</span><br /><br /><span style="font-family: arial; font-weight: bold; font-style: italic; color: rgb(102, 0, 0);">ISO/IEC 20000-2</span><br /><span style="font-family: arial;">ISO/IEC 20000-2 represents an industry consensus on guidance to implementers of ISO 20000 – 1 and offers assistance to service providers planning service improvements or to be audited against ISO/IEC 20000-1.</span><br /><span style="font-family: arial;">Organizations can’t certify against this standard. This standard helps organization to get certified against ISO 20000 – 1.</span><br /><br /><span style="font-family: arial; font-weight: bold; font-style: italic; color: rgb(102, 0, 0);">ISO/IEC TR 20000-3</span><br /><span style="font-family: arial;">ISO/IEC TR 20000-3 provides guidance on scope definition, applicability and demonstration of conformance for service providers aiming to meet the requirements of ISO/IEC 20000-1, or for service providers who are planning service improvements and intending to use ISO/IEC 20000 as a business goal. It can also assist service providers who are considering using ISO/IEC 20000-1 for implementing a service management system (SMS) and who need specific advice on whether ISO/IEC 20000-1 is applicable to their circumstances and how to define the scope of their SMS.</span><br /><span style="font-family: arial;">Service providers who wish to implement an SMS based on ISO/IEC 20000-1 are required to define the scope of their SMS. Definition of service management scope, and the agreement of the scope statement, is a complex stage in the service provider's adoption of ISO/IEC 20000. ISO/IEC 20000-3:2009 provides guidance on the applicability of ISO/IEC 20000-1 and scope of the SMS based on practical examples.</span><br /><span style="font-family: arial;">ISO/IEC TR 20000-3:2009 supplements the advice in ISO/IEC 20000-2, which provides generic guidelines for implementing an SMS in accordance with ISO/IEC 20000-1.</span><br /><span style="font-family: arial;">Organizations can’t certify against this standard. This standard helps organization to get certified against ISO 20000 – 1.</span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5941272430168625981.post-19627955839119032382009-11-03T02:58:00.000-08:002009-12-11T02:01:20.318-08:00ITSM terminology on Macedonian language<span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">The English terminology which is used in the IT is more and more often adopted in Macedonian language. Best example are the words that we use every day: mouse, explorer, monitor, browser etc. Lately there are some efforts for appropriate translation of IT terminology on Macedonian language and standardization and dissemination of the translation. (mostly through the Macedonian version of the software programs and tools)<br /><br />I support this initiative, but I must admit that sometimes the translation sounds very funny.<br /><br /></span><span style="font-family:arial;">The English terminology that is used in the area of IT Service management is completely not standardized on Macedonian i.e. doesn't exist on Macedonian language.</span><br /><span style="font-family:arial;">Whit this post I would like to try to initiate standardizing at least of the basic terms from the ITSM area.</span><span style="font-family:arial;"><br /><br /></span><span style="font-family:arial;"><span style="font-size:130%;"><br /></span><span style="font-weight: bold;font-size:130%;" ><br />English language ----- Macedonian language</span><br /></span></span><ul><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Incident management</span> ----- Управување со инциденти<br /></span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Problem </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">management </span>----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со проблеми</span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Configuration </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">management</span> </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со конфигурациите<br /></span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Change </span></span><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">management </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со промени</span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Release </span></span><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">management </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со верзии<br /></span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Supplier </span></span><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">management</span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;"> </span>----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со добавувачи<br /></span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Business relationship </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">management</span> </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со деловните врски</span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Information security </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">management</span> ----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со безбедност на информации</span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Capacity management</span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"> ----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување со капацитетите<br /></span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Budgeting and accounting for IT services</span> - Одредување на цена и трошоци ја ИТ услугите<br /></span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Service continuity</span> ----- Континуитет на услугата<br /></span></span></li><li><span style="line-height: 115%; font-weight: bold;font-family:";font-size:78%;" ><span style="font-family:arial;">Availability </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">management</span> - </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување сорасположивоста</span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Service level management</span> </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">----- </span></span><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;">Управување сонивото на квалитете на услугите<br /></span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Planning and implementing new or changed services</span> - Планирање и имплементирање на нови или променети услуги</span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Service strategy</span> ----- Стратегија за услугите</span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Service design</span> ----- Дизај на услугите</span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Service transition </span>----- Транзиција на услугата</span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-weight: bold;">Service operations </span>------ Оперативна услуга / Користење на услуга / работење на услуга ???<br /></span></span></li><li><span style="line-height: 115%;font-family:";font-size:78%;" ><span style="font-family:arial;"><span style="font-size:78%;">Continual service improvement</span><span style="font-size:78%;"> ----- Континуирано подобрување на услугата</span><br /></span></span></li></ul><span style="font-size:78%;"><span style="font-family:arial;">More details on this subject on my <a href="http://itsm-makedonija.blogspot.com/">Macedonian ITSM blog</a>.</span><br /><br /></span>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5941272430168625981.post-89301394818088306972009-08-25T00:37:00.000-07:002009-11-27T05:14:30.716-08:00ITSM CertificationsThere are different types of ITSM certifications:<br /><br /><ul><li>certifications for individuals based on ITIL</li><li>certifications for individuals based onISO 20000</li><li>certifications for organizations based on ISO 20000</li></ul>More details for the ITSM certification and how to obtain them is described in the following presentation.<br /><br /><div style="width:425px;text-align:left" id="__ss_1780377"><a style="font:14px Helvetica,Arial,Sans-serif;display:block;margin:12px 0 3px 0;text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska/itsm-qualification-schemes" title="ITSM Qualification Schemes">ITSM Qualification Schemes</a><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=itsmqualificationschemeszamasitopendaysfinal-ana-090728095345-phpapp01&stripped_title=itsm-qualification-schemes" /><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=itsmqualificationschemeszamasitopendaysfinal-ana-090728095345-phpapp01&stripped_title=itsm-qualification-schemes" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;">View more <a style="text-decoration:underline;" href="http://www.slideshare.net/">presentations</a> from <a style="text-decoration:underline;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a>.</div></div><br /><br /><a style="margin: 12px 0pt 3px; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; display: block; text-decoration: underline;" href="http://www.slideshare.net/ana_meskovska/itsm-qualification-schemes" title="ITSM Qualification Schemes"></a>Presentation for ITSM qualification Scheme which I presented on the <a href="http://www.masit.org.mk/?open=SEEITA_2008&lang=en">6th SEEITA and 5th MASIT Open Days Conference. </a>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5941272430168625981.post-80972659691671021352009-07-11T12:11:00.000-07:002009-11-08T08:22:06.054-08:003rd itSMF Regional Conference<div style="text-align: justify;"><span style="font-family:arial;">In the period of 27-28 May 2009 itSMF Macedonia organized the 3rd itSMF Regional Conference.<br /><br /></span>On the conference there were very rich and interesting presentations, but sadly there was very small attendance.<br /><br /><span style="font-family:arial;"></span>More detail for this conference you can find on the official <a href="http://www.itsmf.org.mk/">itSMF Macedonia website</a> (<a href="http://www.itsmf.org.mk/index.php?option=com_content&task=view&id=47&Itemid=1">agenda</a> and <a href="http://www.itsmf.org.mk/index.php?option=com_content&task=view&id=48&Itemid=1">presentations</a>), <a href="http://www.itsmfi.org/">itSMF International</a> (<a href="http://www.itsmfi.org/content/report-3rd-itsmf-regional-conference-macedonia">interviews with the participants</a>), as well as in the <a href="http://www.bug.hr/">BUG</a> magazine (<a href="http://www.bug.hr/vijesti/itsmf-konferencija-ohridu/96909.aspx">news</a>).<br /><br /><span style="font-family:arial;"></span>Below is my presentation on subject Integration of various standards relevant for ICT (ISO20000, ISO27001, ISO 9001 and ITIL).<br /><br /><span style="font-family:arial;"></span></div><div style="width: 425px; text-align: justify;" id="__ss_1713617"><span style="font-size:100%;"><a style="margin: 12px 0pt 3px; font-family: arial; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; display: block; text-decoration: underline;" href="http://www.slideshare.net/ana_meskovska/integration-of-ict-standards" title="Integration of ICT Standards">Integration of ICT Standards</a><object style="margin: 0px; font-family: arial;" height="355" width="425"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=integrationofictstandardsfinal-090713041643-phpapp01&stripped_title=integration-of-ict-standards"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=integrationofictstandardsfinal-090713041643-phpapp01&stripped_title=integration-of-ict-standards" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="355" width="425"></embed></object></span><div style="height: 26px; padding-top: 2px;font-family:tahoma,arial;font-size:11px;"><span style="font-size:100%;"><span style="font-family:arial;">View more </span><a style="text-decoration: underline; font-family: arial;" href="http://www.slideshare.net/">presentations</a><span style="font-family:arial;"> from </span><a style="text-decoration: underline; font-family: arial;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a><span style="font-family:arial;">.</span><br /><br /><span style="font-family:arial;"><br /></span></span></div></div><br /><div style="text-align: justify;"><span style="font-size:100%;"><span style="font-family:arial;">Also I enclose the presentation of my colleague Viktorija Donceva, who was talking for the practical experience from implementation of ISO 20000 and her interview for TV.</span></span><br /></div><br /><div style="width: 425px; text-align: left;" id="__ss_1718278"><a style="margin: 12px 0pt 3px; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; display: block; text-decoration: underline;" href="http://www.slideshare.net/ana_meskovska/experience-from-implementation-of-iso-20000" title="Experience from Implementation of ISO 20000">Experience from Implementation of ISO 20000</a><object style="margin: 0px;" height="355" width="425"><param name="movie" value="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=experiencefromimplementationofiso20000final-090714020327-phpapp02&stripped_title=experience-from-implementation-of-iso-20000"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://static.slidesharecdn.com/swf/ssplayer2.swf?doc=experiencefromimplementationofiso20000final-090714020327-phpapp02&stripped_title=experience-from-implementation-of-iso-20000" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" height="355" width="425"></embed></object><div style="font-size: 11px; font-family: tahoma,arial; height: 26px; padding-top: 2px;">View more <a style="text-decoration: underline;" href="http://www.slideshare.net/">presentations</a> from <a style="text-decoration: underline;" href="http://www.slideshare.net/ana_meskovska">Ana Meskovska</a>.</div></div><br /><br /><object width="480" height="295"><param name="movie" value="http://www.youtube.com/v/GKB3TYTf45k&hl=en&fs=1&color1=0xe1600f&color2=0xfebd01"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/GKB3TYTf45k&hl=en&fs=1&color1=0xe1600f&color2=0xfebd01" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="440" height="265"></embed></object>Unknownnoreply@blogger.com0