Received 22.06.2023, Revised 18.10.2023, Accepted 28.11.2023

Functions of international remote end-user support teams of information systems in a global IT company

Olena Moroz, Oleksandr Kyssa

The article studied and analyzed the functions and models of international technical support teams in global IT companies in the context of continuous modernization of information systems. A review of the latest scientific findings and publications in the field of information systems and support team management was carried out to identify current trends and functions of multinational teams in the global IT environment. The main topics covered include the role of organizational support in implementing effective remote work, global IT management, conflict management strategies in multicultural teams, and innovative methods of remote collaboration. The article analyzes in detail the contributions of well-known researchers and assesses the impact of their research on the overall development of the academic community. In addition, the research aims to identify new theoretical approaches and optimal models for organizing the functions of international technical support teams, taking into account the unique challenges and cultural peculiarities that arise in the IT industry. The research direction of the article is to provide an in-depth review and generalization of the functions of international remote end-user support teams of information systems in a global IT company to make a significant contribution to the scientific discourse and identify areas for further research in this area

IT enterprise; IT infrastructure; information technology; technical support; software; hardware; communication; end-users
6-18
Moroz, O., & Kyssa, O. (2023). Functions of international remote end-user support teams of information systems in a global IT company. Innovation and Sustainability, 3(4), 6-18. https://doi.org/10.31649/ins.2023.4.6.18

References

[1] Errichiello, L., & Pianese T. (2021). The role of organizational support in effective remote work implementation in the post-COVID era. In D. Wheatley, I. Hardill & S. Buglass (Eds.), Handbook of research on remote work and worker well-being in the post-COVID-19 era (pp. 221-242). Hershey: IGI Global. doi: 10.4018/978-1-7998-6754-8.ch013.

[2] Sia, S.K., Soh, C., & Weill, P.D. (2010). Global IT management: Structuring for scale, responsiveness, and innovation. Communications of the ACM, 53(3), 59-64. doi: 10.1145/1666420.1666449.

[3] Abadir, S., Batsa, E., Neubert, M., & Halkias, D. (2020). Leading multicultural teams in agile organizations. SSRN, 1-28. doi: 10.2139/ssrn.3507635.

[4] Druta, R., Druta, C., Negirla, P., & Silea, I. (2021). A review on methods and systems for remote collaboration. Applied Sciences, 11(21), article number 10035. doi: 10.3390/app112110035.    

[5] Choudhury, P., Foroughi, C., & Larson, B. (2021). Work-from-anywhere: The productivity effects of geographic flexibility. Strategic Management Journal, 42, 655-683. doi: 10.1002/smj.3251.

[6] Bernstein, E.S., & Turban, S. (2018). The impact of the ‘open’ workspace on human collaboration. Philosophical Transactions of the Royal Society B, 373(1753), article number 20170239. doi: 10.1098/rstb.2017.0239.

[7] Bernstein, E.S., Shore, J.C., & Jang, A.J. (2022). Network centralization and collective adaptability to a shifting environmentOrganization Science.

[8] Cygal, K., Gilliland, M., Hannibal, E., & Stirling, E. (2021). Remote work: The road to the future: Transformation of the Global Workforce. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Tax/dttl-remote-work-the-road-to-the-future.pdf.

[9] Tabunshchyk, H.V., Kapliienko, T.I., & Petrova, O.A. (2016). Design and modelling of software of modern information systems. Zaporizhzhia: Dyke Pole.

[10] Vanіea, K., & Rashidi, Y. (2016). Tales of software updates: The process of updating software. In CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 3215-3226). New York: Association for Computing Machinery. doi: 10.1145/2858036.2858303.

[11] Qualifications Pack-Service Engineer Introduction. (2019). Retrieved from https://nsdcindia.org/sites/default/files/ELEQ4607_Service_Engineer_v1_04_01_2019.pdf.

[12] Gilster, R. (2001). PC Hardware: A Beginner’s Guide. New York: McGraw-Hill.

[13] Klimushyn, P., Solianyk, T., Mozhaev, O., Nosov, V., Kolisnyk, T., & Yanov, V. (2022). Hardware support procedures for asymmetric authentication of the internet of things. Innovative Technologies and Scientific Solutions for Industries, 4(18), 31-39. doi: 10.30837/ITSSI.2021.18.031.

[14] Li, Y.J., & Hoffman, E. (2019). Information security policy compliance. Retrieved from https://www.researchgate.net/publication/337144310_Information_Security_Policy_Compliance.

[15] Al-Omari, A., El-Gayar, O., & Deokar, A. (2012). Security policy compliance: User acceptance perspective. In 45th Hawaii International Conference on System Sciences (pp. 3317-3326). Maui: IEEE. doi: 10.1109/HICSS.2012.516.

[16] Hrebeniuk, A.M., & Rybalchenko, L.V. (2020). The basics of information security management. Dnipro: Dnipro State University of Internal Affairs.

[17] Information Security. Policy, information security policy, procedures, guidelines. (2017). Retrieved from https://oklahoma.gov/content/dam/ok/en/omes/documents/InfoSecPPG.pdf.

[18] Karaymeh, A., Ababneh M., Qasaimeh, M., & Al-Fayoumi, M. (2019). Enhancing data protection provided by VPN connections over open Wi-Fi networks. In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS) (pp. 1-6). Amman: IEEE. doi: 10.1109/ICTCS.2019.8923104.

[19] Nahid, M.H. (2015). Network virtualization & modeling of VPN SecurityInternational Journal of Advanced Research in Computer Science and Software Engineering, 5(9), 31-37.

[20] Jyothi, K.K., Reddy, B.I. (2023). Study on Virtual Private Network (VPN), VPN’s protocols and securityLaw and Economics, 3(5), 919-932.

[21] Miller, L. (2021). Unified communications as a service. Hoboken: Wiley & Sons, Inc.

[22] Dziembek, D., & Turek, T. (2018). Characteristics and application of unified communications as a service (UCaaS) in enterprises. Informatyka Ekonomiczna, 4(50), 47-65. doi: 10.15611/ie.2018.4.04.

[23] Barthwal, D. (2016). Mobile device management (MDM) in Organizations. Retrieved from https://www.researchgate.net/publication/305380830_Mobile_Device_Management_MDM_in_Organizations.

[24] Ragsdill, D. (2017). Best ways to extend endpoint management and security to mobile devices. Retrieved from https://www.techopedia.com/wp-content/uploads/2018/07/33469_best-ways-to-extend-endpoint-management-and-security-to-mobile-devices-white-paper-253972.pdf.

[25] Borissova, D., Dimitrova, Z., & Dimitrov, V. (2020). How to support teams to be remote and productive: Group decision-making for distance collaboration software tools. Information & Security, 46(1), 36-52. doi: 10.11610/isij.4603.

[26] Bardel, C., & Falk, Y. (2020). L1, L2 and L3: Same or different? Second Language Research, 37(3). doi: 10.1177/0267658320941033.

[27] Hasan, M.Z., Sarwar, N., Alam, I., Hussain, M.Z., Siddiqui, A.A., & Irshad, A. (2023). Data recovery and backup management:     A cloud computing impact. In 2023 IEEE International Conference on Emerging Trends in Engineering, Sciences and Technology (ICES&T) (pp. 1-6). doi: 10.1109/ICEST56843.2023.10138852.

[28] Challagidad, P.S., & Birje, M.N. (2019). Local and remote recovery of cloud services using backward atomic backup recovery technique for high availability in strongly consistent cloud service: Recovery of cloud service for high availability. International Journal of Advanced Pervasive and Ubiquitous Computing, 11(4), 16-33. doi: 10.4018/IJAPUC.2019100102.

[29] Singh, K., & Kaur, G. (2022). Data backup and recoveryInternational Journal for Technological Research in Engineering, 9(10), 45-46.