SlideShare a Scribd company logo
1 of 6
Download to read offline
Improving Service Level Management Practices:
A Case Study in an IT Service Provider
Organization
Marko Jäntti, Antti Suhonen
University of Eastern Finland, School of Computing
Software Engineering Research Unit
P.O.B 1627, 70211 Kuopio, Finland
Email: marko.jantti@uef.fi
Abstract
The main objective of the Service Level Management process is to ensure
that an agreed level of IT service is provided for all current IT services
and that future services are delivered to agreed achievable targets. The
number of agreed SLAs has rapidly increased in the IT industry while more
and more IT customers have become aware of Service Level Management
best practices. IT Infrastructure Library (ITIL) is the most widely used IT
service management framework that provides best practices for implementing
IT service management processes including Service Level Management. The
research problem of this study is: how Service Level Agreements can be
implemented with an IT service management tool. We use a combination of
IT service management and knowledge management approach to study the
problem. The main contribution of this paper is to present results of a case
study that focused on improving Service Level Management practices in a
Finnish IT service provider company Tieto.
Keywords
Service level management, service level agreement, IT service
1. Introduction
Service Level Agreements (SLA) play an important role
in the current IT service business and software mainte-
nance. SLAs define the service level requirements for the
services provided by the service provider organization and
purchased/used by the customer organization.
Knowledge management aims to ensure that the right in-
formation is delivered to appropriate persons at the right time
[1]. There are three main benefits why SLAs provide valuable
knowledge in IT service management. First, SLAs provide
both an IT organization and a customer with clear information
of the service level, for example, a customer knows that
he/she shall receive a new password within one business
day or an incident resolved within three days after a service
request/incident has been submitted. Many IT companies have
started to improve prioritization of support requests because
they have noticed that they cannot solve large volumes of
incidents and service requests within same target times as
before. Second, SLA documents the knowledge on the roles
and responsibilities and defines the rules what happens after
service targets do not meet expectations, for example, what
is the level of financial sanction to be paid by the service
provider. Third, service monitoring provides the organization
with the knowledge of weak areas in the services or products
which is an important input to Continual Service Improvement
[2].
1.1. Related Work
The Service Level Management (SLM) process is visible in
several frameworks and standards, such as in IT Infrastructure
Library (ITIL) [3], Control Objectives for IT and related Tech-
nology (COBIT) [4] and ISO/IEC 20000 standard [5]. ITIL
is the most widely used IT service management framework
consisting of a set of best practices for managing IT services.
In the ITIL version 2, the SLM process was part of the Service
Delivery book [6]. In the ITIL version 3, the process can be
found in the Service Design publication [7].
The COBIT framework [4] defines roles, metrics and the
following control objectives for the SLM process: Service
Level Management Framework, Definition of Services, Service
Level Agreements, Operating Level Agreements, Monitoring
and Reporting of Service Level Achievements, and Review
of Service Level Agreements and Contracts. The ISO/IEC
20000 standard [5] is an international auditable standard for
IT service management. It defines mandatory requirements for
a service management system and processes.
Much has been written about IT service operation processes,
such as incident management lifecycle [8], improving inci-
dent management [9], [10], exploring the problem manage-
ment from knowledge management perspective and problem
management model within corrective maintenance [11]. The
main objective of service desk and incident management is
to resolve incidents (unplanned interruptions to IT services)
reported by customers and users as soon as possible, however
within agreed service levels. These service levels are agreed
in the SLA documents. These SLA documents could be stored
in an internal knowledge base [12].
There are also studies that have dealt with integration
between ITIL and CMMI approaches for process improvement
[13], the adoption of technology in ITIL implementation
2012 IIAI International Conference on Advanced Applied Informatics
978-0-7695-4826-5/12 $26.00 © 2012 IEEE
DOI 10.1109/IIAI-AAI.2012.36
139
projects [14], and success factors in ITIL implementations
[15]. Surprisingly few studies have dealt with service level
management from service management process perspective.
Motta et al [16] have conducted a survey concerning IT
Service Level Management practices in large organizations.
Hsueh [17] uses adaptive service level management approach
in the aerospace industry. There is an urgent need for studies
that explore the activities of creating and configuring Service
Level Agreements in the IT service management tools. IT
companies have to prepare for establishing SLA monitoring
capabilities although their customers would not require SLAs
at the moment.
1.2. Our Contribution
This study was carried out during KISMET (Keys to IT
Service Management and Effective Transition of Services)
research project at the University of Eastern Finland. The main
contribution of this paper is to
• describe the phases how SLA rules were implemented to
the IT service management tool
• provide lessons learnt from improving service level man-
agement practices
We use a combination of IT service management and
knowledge management approach to study the research prob-
lem. During the study, we followed the core knowledge
management activities [18]: identify, create, store, share and
use knowledge. The results of this paper might be useful for
employees that deal with service level management activities
or are configuring SLA tools (e.g. service level managers,
incident managers, support engineers and customer service
managers).
The remainder of the paper is organized as follows. In
Section 2, the research problem, research and data collection
methods and data analysis of this study are described. In
Section 3, we present how SLM process was improved and
SLA rules created. Section 4 is the analysis of findings. The
discussion and the conclusions are given in Section 5.
2. Research Problem & Methodology
This case study is a part of the results of KISMET (Keys to
IT Service Management and Effective Transition of Services)
research project at the University of Eastern Finland. The case
study was carried out in November 2011 - January 2012. The
research settings consists of three elements: research problem,
research methods and research data. The research problem of
this study is: How service level management practices can be
improved by using IT service management framework ITIL.
The research problem was divided in the following research
questions:
• What type of process is used to manage SLAs?
• Who is negotiating on services with customers?
• Is there an existing service catalogue and what is the
location?
• What types of roles are related to SLM process?
• Are reviews conducted between customers and the service
provider regarding services and service level agreements
on a regular basis?
• How organizations monitors that service level targets are
met?
• How the collected information on service level monitor-
ing is processed and exploited?
• Who is responsible for maintaining service descriptions
after changes?
• How IT service management tool does support the SLM
process?
The KISMET research team received the research problem
from the case organization’s representatives. We used a com-
bination of case study and action research methods in our
exploratory case study. The case study is "an empirical inquiry
that investigates a contemporary phenomenon within its real
life context [19]. Case study methods were used to identify the
current state of the service level management process. Action
research methods were used to improve working practices (e.g.
configure SLA module and train employees to use it).
Figure 1. The case study context
The unit of analysis we were exploring in this study is an IT
service provider organization that was interested in implement-
ing SLA rules to the IT service management tool. The orga-
nization had over ten year’s experience with IT Infrastructure
Library, mainly with service operation processes. However,
there was a need to establish the service level mananagement
practices and create an environment that enables monitoring
and measurement of SLAs.
140
2.1. Case Organization and Data Collection Methods
The case organization is a Finnish IT service provider
organization that offers information technology, product devel-
opment and consulting services in Northern Europe. The com-
pany has around 16 000 employees operating in 30 countries.
The company operates in several business domains including
networking and media, banking and insurance, forestry, health
care, logistics and energy industry. This case study was carried
out in the business unit that provides solutions and services
for Scandinavian energy companies. The case organization was
selected with a convenience sampling. The case organization
is one of the research unit’s industrial partners.
Multiple data collection methods proposed by Yin [19] were
used during the study and the following data sources were
used:
• Documentation: Service Level Agreement between
the case organization and a customer, SLM process
description, a user guide to the SLA module of the
IT service management tool
• Archives and records: Excel sheets on incidents and
their resolution times, emails related to SLM processes
• Interviews and discussions: interviews for selected
target audience.
• Participative observation: SLA/SLM process im-
provement meetings (November 2011- January 2012),
SLA workshop .
• Physical artifacts: Case organization’s intranet, access
to the SLA module of the ITSM tool.
2.2. Data Analysis
We used a within-case analysis method [20] in this study.
The within-case analysis focuses on examining cases carefully
as stand-alone entities before making any generalizations. The
case study results were presented in a cronological order
according to the KISMET model phases. Researcher, data and
method triangulation were used to support the data analysis.
Three case study researchers participated in the data collection
and analysis. Case study results were also validated with the
case organization’s representatives in a pilot closure meeting.
3. Improving Service Level Management Prac-
tices
KISMET (Keys to IT Service Management Excellence
Technique) model was used as a roadmap in the improvement
of the service level management process. The KISMET model
has been developed in the IT service management research
projects of the University of Eastern Finland. The model
consists of the following seven phases: 1) Create a process
improvement infrastructure 2) Perform a process assessment,
3) Plan process improvement actions, 4) Improve/Implement
the process based on ITSM practices, 5) Deploy and introduce
the process, 6) Evaluate process improvement and 7) Contin-
uous process improvement. We also exploited core knowledge
management activities (identify, create, store, share and use
knowledge) because we expected that the SLM process would
benefit from effective knowledge management.
3.1. Create a process improvement infrastructure
The goals for the process improvement were discussed in
the meeting of November 16th with case organization’s 2 rep-
resentatives. The first goal that was agreed was to improve case
organization’s service level management practices based on IT
service management framework IT Infrastructure Library. The
second goal was to study how the IT service management tool
supports the service level management process.
The third goal was to configure the SLA alerts to the IT ser-
vice management tool by using the service level requirements
of the Service Level Agreement that was created between the
case organization and a customer. The person responsible for
quality management commented that some customers are not
satisfied with the resolution times. The SLA module would
help in showing the real situation. Another important issue
that was mentioned by the case organization’s representative
was that SLA module and experience on using it enables
Tieto to steer the SLA negotiation process with customers (or
customers consultants). The KISMET research team consisted
of three researchers that were granted an access to the case
organization’s facilities in Kuopio.
3.2. Perform a Tool/Process Assessment
The process assessment focused on the service level man-
agement process and the SLA module of the IT service
management tool. The SLA module is an add-on feature to
the IT service management tool. The module enables creating,
monitoring and controlling Service Level Agreements [21].
The research group had used the service desk functions of
the tool but had no previous experience on the SLA module.
During the study, researchers noticed that Service Level Agree-
ments are implemented in the tool by using SLA templates (see
Figure 2) that can be tailored according to customers’ needs.
Figure 2. Editing the SLA template
141
A service level agreement could be related to an existing
customer, a product, a component or a configuration item and
a service desk user is able to see whether there is an SLA
associated with the service desk case, because the system will
display a text box [21]. The following questions (Q) guided
our data collection on the current state of the service level
management. Answers (A) are presented after each question.
• Q: What type of process is used to manage SLAs? A: The
organization’s Service Level Agreement process consists
of the following phases: Define and agree service level
requirements and targets, agree and document service
level targets, confirm SLA/OLA targets, agree and docu-
ment service measuring and reporting, define and confirm
measurements, assess changes to service and assess risks,
review and revise SLAs and UCs, confirm and agree SLA,
approve SLA, and ensure service delivery readiness and
capabilities.
• Q: Who is negotiating on services and service levels
with customers? A: Sales persons are responsible for
negotiating services and service levels.
• Q: Is there an existing service catalogue and what is the
location? A: Partly. The research group observed that the
organization used the product catalogue but the contact
persons did not know the exact location of that catalogue.
They were not familiar with the term ’service catalogue’.
• Q: What types of roles are related to SLM process? A:
The following roles were identified: Continuous Service
Manager, Customer Service Responsible, Service Level
Manager (it was not clear to whom this role was assigned)
• Q: Are reviews conducted between customers and the
service provider regarding services and service level
agreements on a regular basis? A: It depends on a
customer and business domain. Usually, a review meeting
is organized once in a month. Some customers are not
interested in quality meetings because they have to pay
for them.
• Q: How organization monitors that service level targets
are met? A: Monitoring is performed through Service
Level Reports based on the SLA and customer feedback.
• Q: How the collected information on service level mon-
itoring is processed and exploited? A: Information on
service level monitoring is discussed with customers in
monthly review meetings. Customer support cases that
have exceeded the target response/resolution times are
analyzed in more detailed level.
• Q: Who is responsible for maintaining service descrip-
tions after changes? A: A Service manager or a Contin-
uous Service Manager.
• Q: How IT service management tool does support the
SLM process? A: The SLA module of the tool enables
creating different types of SLA rules (for example, reac-
tion and resolution time rules).
3.3. Plan process improvement actions
The process improvement actions were planned based on the
findings of the previous phase. The research project decided
to focus on the following actions:
• configure the SLA module of the ITSM tool and create
SLA rules for incidents regarding five products (the
service level requirements for response and resolution of
incidentswere documented in the SLA)
• study what types of SLA reports the module can provide
• produce a more practical level user guide of the SLA
module for the case organization and train employees to
create and maintain SLAs with the SLA module
3.4. Improve/Implement the process/tool based on
ITSM practices
The improve/implement phase focused on configuring the
SLA module. KISMET research team’s main objective was
to create reaction and resolution time rules for one customers
products. These reaction and resolution times were aligned
with customer’s service level requirements and were only
targeted at incidents.
Reaction and resolution times were implemented to the
ITSM tool by creating service level agreement templates for
each product (this also required to determine which product
version would be covered of time rules). One of the main areas
while creating template was to design appropriate reaction and
resolution time rules. Completed reaction and resolution rules
were formed from following elements: Name of the rule, state,
view, working hour settings and alerts.
State: In this context, a state means one or more states which
are covered by the rule (reaction or resolution time). In other
words, while a case/ticket is in one of these chosen states,
reaction or resolution time will pass and while a case is in a
state which is not covered by the rule, reaction or resolution
time shall be on hold, for example, waiting for customers
actions.
View: the view determines which cases are covered by
the rule (for example, what is the type (incident or service
request), priority (low, normal or high) and origin (test or live
environment) of the case/ticket). In practice, this could mean
that only priority one incidents which are coming from live
environment would be covered by the created rule.
Working hour settings: Working hour settings determines
dates and clock hours during which the reaction or resolution
time will pass. For example, in the situation where the res-
olution time of a case is 24 hours and organization is using
working hours set Monday to Friday 8:00 - 16:00, it will be
interpreted in the following way: organization has three days
(24h/8) to resolve the case before resolution time will expire.
Alerts: an alert is an email message which will be sent to
chosen parties in specific time (example when resolution time
is expired). A user has full control to choose alarm times,
persons who will get the alert message and what will be the
content of the alert message.
142
3.5. Deploy and introduce the process/tool
The deployment of the service level agreement was done
by linking the product to the created service level agreement
template (which includes reaction and resolution time rules).
We observed that creating different instances from the service
level agreement template is not possible in the ITSM tool of
the case organization. Thus, the same service level agreement
template can’t be used by several customers at the same time
if their service level agreements for same product are not the
same (there are differences in reaction and resolution times).
Additionally, any changes to a service level agreement have
to be made by editing the service level agreement template.
During the deployment of the service level agreement one also
needs to determine the period of time when the service level
agreement is in use.
In the end of the Deploy and introduce phase a SLA
training session was organized in the case organization in
January 20th. Several stakeholder groups were invited to
the training session: customer responsible persons, customer
service representatives, project managers, product managers,
and service desk workers and specialists. The first part of
the session focused on presenting the role and the contents
of the SLA in the organization. This was done by the case
organization’s representative. In the second part of the session,
the research group demonstrated how to create and configure
new SLA rules for customer’s products. In this phase, the
research group also had to create list of persons who shall
receive SLA alerts messages that was a time-consuming task.
3.6. Evaluate the process/tool improvement
Evaluating the process/tool improvement was done in the
final meeting of the pilot. The case organization’s representa-
tives commented that the SLA monitoring tool revealed well
the current situation of support request handling and both weak
and good areas in customer support. An additional comment
was that customer support could use the SLA monitoring
results to show management that more resources are needed
to resolve cases. Created SLA rules were transferred into the
operation phase. The case organization seemed to be satisfied
with the results.
4. Analysis
In the analysis phase of this study, we summarized case
study findings in the form of lesson learned. A source for each
lesson is presented in parentheses (AR=Artefacts, ID= Inter-
views and discussions, O= Observation, D= Documentation,
ST= Seminars and trainings organized by the research group).
Lessons were also classified according to core knowledge
management activities.
Lesson 1: Aim at clear alert email messages (O), Create
knowledge. Defining the appropriate title to the alert email
message template is important aspect when designing effective
handling practice for alert messages. A well designed email
title makes it possible to easily separate alert messages from
other email messages and alert email messages can be auto-
matically redirect to different folders based on title information
(for example, moving alerts to different folders based on
priority of case).
Lesson 2: Creating new instances of SLA templates is
complicated (O, AR), Create knowledge. In practice the
usage of SLA templates differs from the common template
ideology because the ITSM tool seems not to allow making
instances from service level agreement templates. If a user
wants to make a new instance of the template, he is forced
to make a copy of the template itself and implement changes
straight to the copy.
Lesson 3: Use colour codes to visualize SLAs (O, AR),
Share knowledge. The ITSM tool could have had a feature
(example colour codes) which would allow users to see at
once if the reaction or resolution time regarding the incident
is going to expire soon or has already expired. Colour codes
would be useful, for example, in the case list view to show
cases that are close to breach SLAs (a warning mode) or have
resulted in the SLA breach.
Lesson 4: Ensure that SLA rule uses appropriate calen-
dar time as a basis of the agreement (ST, AR), Create
knowledge. There are different types of holiday settings
available in the tool. We observed in the training session
that we have to change the holiday settings for all the SLA
templates that we had created (use mode Finnish holidays. At
the moment, holidays are not included in the SLA time.
Lesson 5: Avoid too many alert messages (ID, AR, O),
Store knowledge. During the configuring the SLA module,
the research team found a bug which increases the number
of alert messages remarkably. The large number of alerts was
addressed by several persons who had received alert messages.
The problem was that one message is repeatedly sent to the
receivers in a situation where 1) an SLA time rule has been
exceeded and 2) user makes changes to the incident. This bug
had been identified by the case organization’s other business
unit. The bug was reported to the ITSM tool provider.
Lesson 6: The number of SLA rules increases rapidly
(O), Identify knowledge. Even in a simple SLA case (6
products used by one customer) that we had, the number of
SLA rules started to increase fast. There were 4 priority levels
and for each priority level we needed to configure a response
time rule and a resolution time rule. Both a response time
rule and a resolution time rule required SLA warning alert
and SLA breach alert. Thus, organizations should be careful
in offering customized SLAs to customers. In our case, we
had to think which of the alerts really create value.
Lesson 7: There is a need for advanced SLA reports
(AR, O), Identify/Use knowledge. ITSM tool doesn’t allow
user to create own SLA report templates but forces user to use
the built-in report template which isn’t editable. User can still
specify the time period from which the cases will be taken
and choose from which kind of cases he or she wants more
details (example cases which weren’t solved by the end of the
resolution time).
143
Lesson 8: Service level management requires defined
services and service catalogue (ID, O), Identify knowledge.
Discussions with the case organization’s representatives re-
vealed that the concept ’service catalogue’ was not very visible
in the organization. However, we observed that instead of the
service catalogue, employees were familiar with the concepts
’product portfolio’ and ’product catalogue’.
The above mentioned lessons learnt are not presented in
a priority order. Many of the observations were related to
configuration work of the SLA module. We found that in some
points creating and maintaining service level agreements with
the ITSM tool of case organization was not effective because
the tool forced users to do many tasks manually, for example,
a user is not able to make copies of created lists (states or
users) which are used multiple times in different SLA time
rules). Moreover, several settings are hard to find (they remain
hidden behind many menus) if the user doesn’t have a good
knowledge of the tool.
The observations that we made on SLM practices indicate
that the organization had an ITIL-based process framework
with documented SLM practices. However, these practices
were not very visible in the daily work of the employees.
Regarding the SLM roles, there were not a clear assignment
of Service Level Manager but Customer Responsible persons
seemed to be prepared for performing SLM activities, such as
discuss service level achievements with customers.
5. Conclusion
The main objective of this paper was to answer the research
problem: how Service Level Agreements can be implemented
with an IT service management tool. A case study and action
research methods with a single case were used in this study.
The case organization Tieto is one of the leading IT service
companies in Scandinavia and one of the KISMET project’s
industrial partners. The main contribution of this paper was
to describe the phases how SLA rules were implemented and
present lessons learnt from the project.
Despite the small tool-related difficulties, the SLA pilot
study was considered to be a success. After the study, the
case organization had the SLA module in use for the selected
customer, guidelines and competence how to create new SLA
rules, and increased knowledge on the limitations of the ITSM
tool regarding the SLA module.
Using a case study research method includes certain lim-
itations. First, this case study was performed with one case
organization which means that the results of this study might
not be generalizable with other case studies. Second, we
carried out a study within a relatively short research period
(1,5 months). A longer research period would have provided
valuable information how other teams of the case organization
introduce SLM methods. Third limitation is related to data
collection. We could have interviewed more people related to
the SLM process, such as sales persons.
Further research could focus on comparing service level
management practices between IT service provider organiza-
tions. It would also be interesting to study whether there are
open source tools for service level management and whether
those tools could be integrated to the existing service desk
systems.
Acknowledgment
This paper is based on research in KISMET project funded
by the National Technology Agency TEKES (no. 70035/10),
European Regional Development Fund (ERDF), and industrial
partners.
References
[1] OGCc, ITIL Service Transition. The Stationary Office, UK, 2007.
[2] OGCe, ITIL Continual Service Improvement. The Stationary Office,
UK, 2007.
[3] OGC, ITIL Service Strategy. The Stationary Office, UK, 2007.
[4] COBIT 4.1, Control Objectives for Information and related Technology:
COBIT 4.1. IT Governance Institute, 2007.
[5] ISO/IEC, ISO/IEC FDIS 20000:1. ISO/IEC JTC 1 Secretariat: ANSI,
2010.
[6] OGCb, ITIL Service Delivery. The Stationary Office, UK, 2002.
[7] OGCb07, ITIL Service Design. The Stationary Office, UK, 2007.
[8] J. Caldeira and F. B. e Abreu, “Influential factors on incident manage-
ment: Lessons learned from a large sample of products in operation,”
in Product-Focused Software Process Improvement, A. Jedlitschka and
O. Salo, Eds., vol. 5089. Springer Verlag, 6 2008, pp. 330–344.
[9] M. Jäntti, “Defining requirements for an incident management system:
A case study,” in Proceedings of the Fourth International Conference
on Systems (ICONS 2009). IEEE Computer Society, 2009.
[10] M. Jäntti, “Lessons learnt from the improvement of customer support
processes: A case study on incident management,” in Product-Focused
Software Process Improvement, ser. Lecture Notes in Business Informa-
tion Processing, W. Aalst, J. Mylopoulos, N. M. Sadeh, M. J. Shaw,
C. Szyperski, F. Bomarius, M. Oivo, P. Jaring, and P. Abrahamsson,
Eds. Springer Berlin Heidelberg, 2009, vol. 32, pp. 317–331.
[11] M. Kajko-Mattsson, “Corrective maintenance maturity model: Problem
management,” in ICSM ’02: Proceedings of the International Conference
on Software Maintenance (ICSM’02). Washington, DC, USA: IEEE
Computer Society, 2002, p. 486.
[12] J. Graham and B. Hart, “Knowledge integration with a 24-hour help
desk,” in SIGUCCS ’00: Proceedings of the 28th annual ACM SIGUCCS
conference on User services. New York, NY, USA: ACM Press, 2000,
pp. 92–95.
[13] A. A. Latif, M. M. Din, and R. Ismail, “Challenges in adopting and
integrating itil and cmmi in ict division of a public utility company,”
Computer Engineering and Applications, vol. 1, pp. 81–86, 2010.
[14] M. Mohamed, V. Ribiere, K. O’Sullivan, and M. Mohamed, “The re-
structuring of the information technology infrastructure library (itil)
implementation using knowledge management framework,” The Journal
of Information and Knowledge Management Systems, vol. 38, no. 3, pp.
315–333, 2008.
[15] W.-G. Tan, A. Cater-Steel, and M. Toleman, “Implementing it service
management: A case study focussing on critical success factors,” Journal
of Computer Information Systems, vol. 50, no. 2, 2009.
[16] T. Barroero, G. Motta, and M. Durante, “Sustainable service level
agreements,” in Services Computing (SCC), 2011 IEEE International
Conference on, july 2011, pp. 679–684.
[17] M.-C. Hsueh, “Adaptive service level management,” in Enterprise Dis-
tributed Object Computing Conference, 2007. EDOC 2007. 11th IEEE
International, oct. 2007, p. 451.
[18] CEN Workshop Agreement CWA 14924-1, European Guide to Good
Practice in Knowledge Management, Part 1. European Committee for
Standardization, 2004.
[19] R. Yin, Case Study Research: Design and Methods. Beverly Hills, CA:
Sage Publishing, 1994.
[20] K. Eisenhardt, “Building theories from case study research,” Academy
of Management Review, vol. 14, pp. 532–550, 1989.
[21] Sysart, Requeste User Guide: Service Level Agreements, 2012.
144

More Related Content

Similar to IIAI-AAI.2012.36.pdf

A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...Carrie Cox
 
ITIL With Information Security
ITIL With Information SecurityITIL With Information Security
ITIL With Information Securityvikasraina
 
Driving Business Excellence through Innovative IT Service Management
Driving Business Excellence through Innovative IT Service ManagementDriving Business Excellence through Innovative IT Service Management
Driving Business Excellence through Innovative IT Service ManagementCognizant
 
What 'is' the Current Value of your ITSM?
What 'is' the Current Value of your ITSM?What 'is' the Current Value of your ITSM?
What 'is' the Current Value of your ITSM?NUS-ISS
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
 
Iscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service ManagementIscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service ManagementIscope Digital
 
The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
 
Service Operations Management
Service Operations ManagementService Operations Management
Service Operations ManagementAshley Lovato
 
Integrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionIntegrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionCA Technologies
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013Mike Wright
 
Itil the basics
Itil the basicsItil the basics
Itil the basicsdarshan185
 
Assess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdfAssess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdfAelum Consulting
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
 

Similar to IIAI-AAI.2012.36.pdf (20)

Itil 2
Itil 2Itil 2
Itil 2
 
A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...
 
ITIL With Information Security
ITIL With Information SecurityITIL With Information Security
ITIL With Information Security
 
About itil v3
About itil v3About itil v3
About itil v3
 
Driving Business Excellence through Innovative IT Service Management
Driving Business Excellence through Innovative IT Service ManagementDriving Business Excellence through Innovative IT Service Management
Driving Business Excellence through Innovative IT Service Management
 
What 'is' the Current Value of your ITSM?
What 'is' the Current Value of your ITSM?What 'is' the Current Value of your ITSM?
What 'is' the Current Value of your ITSM?
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
 
Iscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service ManagementIscope Digital : Integrated IT Service Management
Iscope Digital : Integrated IT Service Management
 
N18030594102
N18030594102N18030594102
N18030594102
 
The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...The measurement of maturity level of information technology service based on ...
The measurement of maturity level of information technology service based on ...
 
Overview to itil
Overview to itilOverview to itil
Overview to itil
 
Service Operations Management
Service Operations ManagementService Operations Management
Service Operations Management
 
Itil the basics
Itil the basicsItil the basics
Itil the basics
 
Integrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User AdoptionIntegrated IT Service Management: From Strategy to Implementing to User Adoption
Integrated IT Service Management: From Strategy to Implementing to User Adoption
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 
The Development Of Cobit. Isaca
The Development Of Cobit. IsacaThe Development Of Cobit. Isaca
The Development Of Cobit. Isaca
 
Itil the basics
Itil the basicsItil the basics
Itil the basics
 
Tan catersteel toleman_50_2
Tan catersteel toleman_50_2Tan catersteel toleman_50_2
Tan catersteel toleman_50_2
 
Assess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdfAssess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdf
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 

More from AbdetaImi

TISA-Important-Business-Services-Guide-November-2021.pdf
TISA-Important-Business-Services-Guide-November-2021.pdfTISA-Important-Business-Services-Guide-November-2021.pdf
TISA-Important-Business-Services-Guide-November-2021.pdfAbdetaImi
 
performancemanagementpowerpointpresentationslides-210709054745 (1) (2).docx
performancemanagementpowerpointpresentationslides-210709054745 (1) (2).docxperformancemanagementpowerpointpresentationslides-210709054745 (1) (2).docx
performancemanagementpowerpointpresentationslides-210709054745 (1) (2).docxAbdetaImi
 
46589-infographic ppt-blue.pptx
46589-infographic ppt-blue.pptx46589-infographic ppt-blue.pptx
46589-infographic ppt-blue.pptxAbdetaImi
 
best paper 4AP.pdf
best paper 4AP.pdfbest paper 4AP.pdf
best paper 4AP.pdfAbdetaImi
 
Machine Learning.pdf
Machine Learning.pdfMachine Learning.pdf
Machine Learning.pdfAbdetaImi
 
ICCIDS.2017.8272633 (1).pdf
ICCIDS.2017.8272633 (1).pdfICCIDS.2017.8272633 (1).pdf
ICCIDS.2017.8272633 (1).pdfAbdetaImi
 
ICCIDS.2017.8272633.pdf
ICCIDS.2017.8272633.pdfICCIDS.2017.8272633.pdf
ICCIDS.2017.8272633.pdfAbdetaImi
 
SettingGoalsAndExpectationsForSupervisors.pptx
SettingGoalsAndExpectationsForSupervisors.pptxSettingGoalsAndExpectationsForSupervisors.pptx
SettingGoalsAndExpectationsForSupervisors.pptxAbdetaImi
 
GATE-PDF-1.pdf
GATE-PDF-1.pdfGATE-PDF-1.pdf
GATE-PDF-1.pdfAbdetaImi
 
Bioinformatics2015.pdf
Bioinformatics2015.pdfBioinformatics2015.pdf
Bioinformatics2015.pdfAbdetaImi
 
9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdf9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdfAbdetaImi
 
Biginer it-service-catalog.pdf
Biginer it-service-catalog.pdfBiginer it-service-catalog.pdf
Biginer it-service-catalog.pdfAbdetaImi
 
GATE-PDF-1.pdf
GATE-PDF-1.pdfGATE-PDF-1.pdf
GATE-PDF-1.pdfAbdetaImi
 
Bioinformatics2015.pdf
Bioinformatics2015.pdfBioinformatics2015.pdf
Bioinformatics2015.pdfAbdetaImi
 
9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdf9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdfAbdetaImi
 
938838223-MIT.pdf
938838223-MIT.pdf938838223-MIT.pdf
938838223-MIT.pdfAbdetaImi
 
ITILV41.docx
ITILV41.docxITILV41.docx
ITILV41.docxAbdetaImi
 
gartner ITSM.docx
gartner ITSM.docxgartner ITSM.docx
gartner ITSM.docxAbdetaImi
 
DEFINITION.docx
DEFINITION.docxDEFINITION.docx
DEFINITION.docxAbdetaImi
 

More from AbdetaImi (20)

TISA-Important-Business-Services-Guide-November-2021.pdf
TISA-Important-Business-Services-Guide-November-2021.pdfTISA-Important-Business-Services-Guide-November-2021.pdf
TISA-Important-Business-Services-Guide-November-2021.pdf
 
performancemanagementpowerpointpresentationslides-210709054745 (1) (2).docx
performancemanagementpowerpointpresentationslides-210709054745 (1) (2).docxperformancemanagementpowerpointpresentationslides-210709054745 (1) (2).docx
performancemanagementpowerpointpresentationslides-210709054745 (1) (2).docx
 
46589-infographic ppt-blue.pptx
46589-infographic ppt-blue.pptx46589-infographic ppt-blue.pptx
46589-infographic ppt-blue.pptx
 
best paper 4AP.pdf
best paper 4AP.pdfbest paper 4AP.pdf
best paper 4AP.pdf
 
Machine Learning.pdf
Machine Learning.pdfMachine Learning.pdf
Machine Learning.pdf
 
ICCIDS.2017.8272633 (1).pdf
ICCIDS.2017.8272633 (1).pdfICCIDS.2017.8272633 (1).pdf
ICCIDS.2017.8272633 (1).pdf
 
ICCIDS.2017.8272633.pdf
ICCIDS.2017.8272633.pdfICCIDS.2017.8272633.pdf
ICCIDS.2017.8272633.pdf
 
SettingGoalsAndExpectationsForSupervisors.pptx
SettingGoalsAndExpectationsForSupervisors.pptxSettingGoalsAndExpectationsForSupervisors.pptx
SettingGoalsAndExpectationsForSupervisors.pptx
 
GATE-PDF-1.pdf
GATE-PDF-1.pdfGATE-PDF-1.pdf
GATE-PDF-1.pdf
 
Bioinformatics2015.pdf
Bioinformatics2015.pdfBioinformatics2015.pdf
Bioinformatics2015.pdf
 
9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdf9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdf
 
1365320.pdf
1365320.pdf1365320.pdf
1365320.pdf
 
Biginer it-service-catalog.pdf
Biginer it-service-catalog.pdfBiginer it-service-catalog.pdf
Biginer it-service-catalog.pdf
 
GATE-PDF-1.pdf
GATE-PDF-1.pdfGATE-PDF-1.pdf
GATE-PDF-1.pdf
 
Bioinformatics2015.pdf
Bioinformatics2015.pdfBioinformatics2015.pdf
Bioinformatics2015.pdf
 
9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdf9th_International_Conference_on_Computer.pdf
9th_International_Conference_on_Computer.pdf
 
938838223-MIT.pdf
938838223-MIT.pdf938838223-MIT.pdf
938838223-MIT.pdf
 
ITILV41.docx
ITILV41.docxITILV41.docx
ITILV41.docx
 
gartner ITSM.docx
gartner ITSM.docxgartner ITSM.docx
gartner ITSM.docx
 
DEFINITION.docx
DEFINITION.docxDEFINITION.docx
DEFINITION.docx
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 

IIAI-AAI.2012.36.pdf

  • 1. Improving Service Level Management Practices: A Case Study in an IT Service Provider Organization Marko Jäntti, Antti Suhonen University of Eastern Finland, School of Computing Software Engineering Research Unit P.O.B 1627, 70211 Kuopio, Finland Email: marko.jantti@uef.fi Abstract The main objective of the Service Level Management process is to ensure that an agreed level of IT service is provided for all current IT services and that future services are delivered to agreed achievable targets. The number of agreed SLAs has rapidly increased in the IT industry while more and more IT customers have become aware of Service Level Management best practices. IT Infrastructure Library (ITIL) is the most widely used IT service management framework that provides best practices for implementing IT service management processes including Service Level Management. The research problem of this study is: how Service Level Agreements can be implemented with an IT service management tool. We use a combination of IT service management and knowledge management approach to study the problem. The main contribution of this paper is to present results of a case study that focused on improving Service Level Management practices in a Finnish IT service provider company Tieto. Keywords Service level management, service level agreement, IT service 1. Introduction Service Level Agreements (SLA) play an important role in the current IT service business and software mainte- nance. SLAs define the service level requirements for the services provided by the service provider organization and purchased/used by the customer organization. Knowledge management aims to ensure that the right in- formation is delivered to appropriate persons at the right time [1]. There are three main benefits why SLAs provide valuable knowledge in IT service management. First, SLAs provide both an IT organization and a customer with clear information of the service level, for example, a customer knows that he/she shall receive a new password within one business day or an incident resolved within three days after a service request/incident has been submitted. Many IT companies have started to improve prioritization of support requests because they have noticed that they cannot solve large volumes of incidents and service requests within same target times as before. Second, SLA documents the knowledge on the roles and responsibilities and defines the rules what happens after service targets do not meet expectations, for example, what is the level of financial sanction to be paid by the service provider. Third, service monitoring provides the organization with the knowledge of weak areas in the services or products which is an important input to Continual Service Improvement [2]. 1.1. Related Work The Service Level Management (SLM) process is visible in several frameworks and standards, such as in IT Infrastructure Library (ITIL) [3], Control Objectives for IT and related Tech- nology (COBIT) [4] and ISO/IEC 20000 standard [5]. ITIL is the most widely used IT service management framework consisting of a set of best practices for managing IT services. In the ITIL version 2, the SLM process was part of the Service Delivery book [6]. In the ITIL version 3, the process can be found in the Service Design publication [7]. The COBIT framework [4] defines roles, metrics and the following control objectives for the SLM process: Service Level Management Framework, Definition of Services, Service Level Agreements, Operating Level Agreements, Monitoring and Reporting of Service Level Achievements, and Review of Service Level Agreements and Contracts. The ISO/IEC 20000 standard [5] is an international auditable standard for IT service management. It defines mandatory requirements for a service management system and processes. Much has been written about IT service operation processes, such as incident management lifecycle [8], improving inci- dent management [9], [10], exploring the problem manage- ment from knowledge management perspective and problem management model within corrective maintenance [11]. The main objective of service desk and incident management is to resolve incidents (unplanned interruptions to IT services) reported by customers and users as soon as possible, however within agreed service levels. These service levels are agreed in the SLA documents. These SLA documents could be stored in an internal knowledge base [12]. There are also studies that have dealt with integration between ITIL and CMMI approaches for process improvement [13], the adoption of technology in ITIL implementation 2012 IIAI International Conference on Advanced Applied Informatics 978-0-7695-4826-5/12 $26.00 © 2012 IEEE DOI 10.1109/IIAI-AAI.2012.36 139
  • 2. projects [14], and success factors in ITIL implementations [15]. Surprisingly few studies have dealt with service level management from service management process perspective. Motta et al [16] have conducted a survey concerning IT Service Level Management practices in large organizations. Hsueh [17] uses adaptive service level management approach in the aerospace industry. There is an urgent need for studies that explore the activities of creating and configuring Service Level Agreements in the IT service management tools. IT companies have to prepare for establishing SLA monitoring capabilities although their customers would not require SLAs at the moment. 1.2. Our Contribution This study was carried out during KISMET (Keys to IT Service Management and Effective Transition of Services) research project at the University of Eastern Finland. The main contribution of this paper is to • describe the phases how SLA rules were implemented to the IT service management tool • provide lessons learnt from improving service level man- agement practices We use a combination of IT service management and knowledge management approach to study the research prob- lem. During the study, we followed the core knowledge management activities [18]: identify, create, store, share and use knowledge. The results of this paper might be useful for employees that deal with service level management activities or are configuring SLA tools (e.g. service level managers, incident managers, support engineers and customer service managers). The remainder of the paper is organized as follows. In Section 2, the research problem, research and data collection methods and data analysis of this study are described. In Section 3, we present how SLM process was improved and SLA rules created. Section 4 is the analysis of findings. The discussion and the conclusions are given in Section 5. 2. Research Problem & Methodology This case study is a part of the results of KISMET (Keys to IT Service Management and Effective Transition of Services) research project at the University of Eastern Finland. The case study was carried out in November 2011 - January 2012. The research settings consists of three elements: research problem, research methods and research data. The research problem of this study is: How service level management practices can be improved by using IT service management framework ITIL. The research problem was divided in the following research questions: • What type of process is used to manage SLAs? • Who is negotiating on services with customers? • Is there an existing service catalogue and what is the location? • What types of roles are related to SLM process? • Are reviews conducted between customers and the service provider regarding services and service level agreements on a regular basis? • How organizations monitors that service level targets are met? • How the collected information on service level monitor- ing is processed and exploited? • Who is responsible for maintaining service descriptions after changes? • How IT service management tool does support the SLM process? The KISMET research team received the research problem from the case organization’s representatives. We used a com- bination of case study and action research methods in our exploratory case study. The case study is "an empirical inquiry that investigates a contemporary phenomenon within its real life context [19]. Case study methods were used to identify the current state of the service level management process. Action research methods were used to improve working practices (e.g. configure SLA module and train employees to use it). Figure 1. The case study context The unit of analysis we were exploring in this study is an IT service provider organization that was interested in implement- ing SLA rules to the IT service management tool. The orga- nization had over ten year’s experience with IT Infrastructure Library, mainly with service operation processes. However, there was a need to establish the service level mananagement practices and create an environment that enables monitoring and measurement of SLAs. 140
  • 3. 2.1. Case Organization and Data Collection Methods The case organization is a Finnish IT service provider organization that offers information technology, product devel- opment and consulting services in Northern Europe. The com- pany has around 16 000 employees operating in 30 countries. The company operates in several business domains including networking and media, banking and insurance, forestry, health care, logistics and energy industry. This case study was carried out in the business unit that provides solutions and services for Scandinavian energy companies. The case organization was selected with a convenience sampling. The case organization is one of the research unit’s industrial partners. Multiple data collection methods proposed by Yin [19] were used during the study and the following data sources were used: • Documentation: Service Level Agreement between the case organization and a customer, SLM process description, a user guide to the SLA module of the IT service management tool • Archives and records: Excel sheets on incidents and their resolution times, emails related to SLM processes • Interviews and discussions: interviews for selected target audience. • Participative observation: SLA/SLM process im- provement meetings (November 2011- January 2012), SLA workshop . • Physical artifacts: Case organization’s intranet, access to the SLA module of the ITSM tool. 2.2. Data Analysis We used a within-case analysis method [20] in this study. The within-case analysis focuses on examining cases carefully as stand-alone entities before making any generalizations. The case study results were presented in a cronological order according to the KISMET model phases. Researcher, data and method triangulation were used to support the data analysis. Three case study researchers participated in the data collection and analysis. Case study results were also validated with the case organization’s representatives in a pilot closure meeting. 3. Improving Service Level Management Prac- tices KISMET (Keys to IT Service Management Excellence Technique) model was used as a roadmap in the improvement of the service level management process. The KISMET model has been developed in the IT service management research projects of the University of Eastern Finland. The model consists of the following seven phases: 1) Create a process improvement infrastructure 2) Perform a process assessment, 3) Plan process improvement actions, 4) Improve/Implement the process based on ITSM practices, 5) Deploy and introduce the process, 6) Evaluate process improvement and 7) Contin- uous process improvement. We also exploited core knowledge management activities (identify, create, store, share and use knowledge) because we expected that the SLM process would benefit from effective knowledge management. 3.1. Create a process improvement infrastructure The goals for the process improvement were discussed in the meeting of November 16th with case organization’s 2 rep- resentatives. The first goal that was agreed was to improve case organization’s service level management practices based on IT service management framework IT Infrastructure Library. The second goal was to study how the IT service management tool supports the service level management process. The third goal was to configure the SLA alerts to the IT ser- vice management tool by using the service level requirements of the Service Level Agreement that was created between the case organization and a customer. The person responsible for quality management commented that some customers are not satisfied with the resolution times. The SLA module would help in showing the real situation. Another important issue that was mentioned by the case organization’s representative was that SLA module and experience on using it enables Tieto to steer the SLA negotiation process with customers (or customers consultants). The KISMET research team consisted of three researchers that were granted an access to the case organization’s facilities in Kuopio. 3.2. Perform a Tool/Process Assessment The process assessment focused on the service level man- agement process and the SLA module of the IT service management tool. The SLA module is an add-on feature to the IT service management tool. The module enables creating, monitoring and controlling Service Level Agreements [21]. The research group had used the service desk functions of the tool but had no previous experience on the SLA module. During the study, researchers noticed that Service Level Agree- ments are implemented in the tool by using SLA templates (see Figure 2) that can be tailored according to customers’ needs. Figure 2. Editing the SLA template 141
  • 4. A service level agreement could be related to an existing customer, a product, a component or a configuration item and a service desk user is able to see whether there is an SLA associated with the service desk case, because the system will display a text box [21]. The following questions (Q) guided our data collection on the current state of the service level management. Answers (A) are presented after each question. • Q: What type of process is used to manage SLAs? A: The organization’s Service Level Agreement process consists of the following phases: Define and agree service level requirements and targets, agree and document service level targets, confirm SLA/OLA targets, agree and docu- ment service measuring and reporting, define and confirm measurements, assess changes to service and assess risks, review and revise SLAs and UCs, confirm and agree SLA, approve SLA, and ensure service delivery readiness and capabilities. • Q: Who is negotiating on services and service levels with customers? A: Sales persons are responsible for negotiating services and service levels. • Q: Is there an existing service catalogue and what is the location? A: Partly. The research group observed that the organization used the product catalogue but the contact persons did not know the exact location of that catalogue. They were not familiar with the term ’service catalogue’. • Q: What types of roles are related to SLM process? A: The following roles were identified: Continuous Service Manager, Customer Service Responsible, Service Level Manager (it was not clear to whom this role was assigned) • Q: Are reviews conducted between customers and the service provider regarding services and service level agreements on a regular basis? A: It depends on a customer and business domain. Usually, a review meeting is organized once in a month. Some customers are not interested in quality meetings because they have to pay for them. • Q: How organization monitors that service level targets are met? A: Monitoring is performed through Service Level Reports based on the SLA and customer feedback. • Q: How the collected information on service level mon- itoring is processed and exploited? A: Information on service level monitoring is discussed with customers in monthly review meetings. Customer support cases that have exceeded the target response/resolution times are analyzed in more detailed level. • Q: Who is responsible for maintaining service descrip- tions after changes? A: A Service manager or a Contin- uous Service Manager. • Q: How IT service management tool does support the SLM process? A: The SLA module of the tool enables creating different types of SLA rules (for example, reac- tion and resolution time rules). 3.3. Plan process improvement actions The process improvement actions were planned based on the findings of the previous phase. The research project decided to focus on the following actions: • configure the SLA module of the ITSM tool and create SLA rules for incidents regarding five products (the service level requirements for response and resolution of incidentswere documented in the SLA) • study what types of SLA reports the module can provide • produce a more practical level user guide of the SLA module for the case organization and train employees to create and maintain SLAs with the SLA module 3.4. Improve/Implement the process/tool based on ITSM practices The improve/implement phase focused on configuring the SLA module. KISMET research team’s main objective was to create reaction and resolution time rules for one customers products. These reaction and resolution times were aligned with customer’s service level requirements and were only targeted at incidents. Reaction and resolution times were implemented to the ITSM tool by creating service level agreement templates for each product (this also required to determine which product version would be covered of time rules). One of the main areas while creating template was to design appropriate reaction and resolution time rules. Completed reaction and resolution rules were formed from following elements: Name of the rule, state, view, working hour settings and alerts. State: In this context, a state means one or more states which are covered by the rule (reaction or resolution time). In other words, while a case/ticket is in one of these chosen states, reaction or resolution time will pass and while a case is in a state which is not covered by the rule, reaction or resolution time shall be on hold, for example, waiting for customers actions. View: the view determines which cases are covered by the rule (for example, what is the type (incident or service request), priority (low, normal or high) and origin (test or live environment) of the case/ticket). In practice, this could mean that only priority one incidents which are coming from live environment would be covered by the created rule. Working hour settings: Working hour settings determines dates and clock hours during which the reaction or resolution time will pass. For example, in the situation where the res- olution time of a case is 24 hours and organization is using working hours set Monday to Friday 8:00 - 16:00, it will be interpreted in the following way: organization has three days (24h/8) to resolve the case before resolution time will expire. Alerts: an alert is an email message which will be sent to chosen parties in specific time (example when resolution time is expired). A user has full control to choose alarm times, persons who will get the alert message and what will be the content of the alert message. 142
  • 5. 3.5. Deploy and introduce the process/tool The deployment of the service level agreement was done by linking the product to the created service level agreement template (which includes reaction and resolution time rules). We observed that creating different instances from the service level agreement template is not possible in the ITSM tool of the case organization. Thus, the same service level agreement template can’t be used by several customers at the same time if their service level agreements for same product are not the same (there are differences in reaction and resolution times). Additionally, any changes to a service level agreement have to be made by editing the service level agreement template. During the deployment of the service level agreement one also needs to determine the period of time when the service level agreement is in use. In the end of the Deploy and introduce phase a SLA training session was organized in the case organization in January 20th. Several stakeholder groups were invited to the training session: customer responsible persons, customer service representatives, project managers, product managers, and service desk workers and specialists. The first part of the session focused on presenting the role and the contents of the SLA in the organization. This was done by the case organization’s representative. In the second part of the session, the research group demonstrated how to create and configure new SLA rules for customer’s products. In this phase, the research group also had to create list of persons who shall receive SLA alerts messages that was a time-consuming task. 3.6. Evaluate the process/tool improvement Evaluating the process/tool improvement was done in the final meeting of the pilot. The case organization’s representa- tives commented that the SLA monitoring tool revealed well the current situation of support request handling and both weak and good areas in customer support. An additional comment was that customer support could use the SLA monitoring results to show management that more resources are needed to resolve cases. Created SLA rules were transferred into the operation phase. The case organization seemed to be satisfied with the results. 4. Analysis In the analysis phase of this study, we summarized case study findings in the form of lesson learned. A source for each lesson is presented in parentheses (AR=Artefacts, ID= Inter- views and discussions, O= Observation, D= Documentation, ST= Seminars and trainings organized by the research group). Lessons were also classified according to core knowledge management activities. Lesson 1: Aim at clear alert email messages (O), Create knowledge. Defining the appropriate title to the alert email message template is important aspect when designing effective handling practice for alert messages. A well designed email title makes it possible to easily separate alert messages from other email messages and alert email messages can be auto- matically redirect to different folders based on title information (for example, moving alerts to different folders based on priority of case). Lesson 2: Creating new instances of SLA templates is complicated (O, AR), Create knowledge. In practice the usage of SLA templates differs from the common template ideology because the ITSM tool seems not to allow making instances from service level agreement templates. If a user wants to make a new instance of the template, he is forced to make a copy of the template itself and implement changes straight to the copy. Lesson 3: Use colour codes to visualize SLAs (O, AR), Share knowledge. The ITSM tool could have had a feature (example colour codes) which would allow users to see at once if the reaction or resolution time regarding the incident is going to expire soon or has already expired. Colour codes would be useful, for example, in the case list view to show cases that are close to breach SLAs (a warning mode) or have resulted in the SLA breach. Lesson 4: Ensure that SLA rule uses appropriate calen- dar time as a basis of the agreement (ST, AR), Create knowledge. There are different types of holiday settings available in the tool. We observed in the training session that we have to change the holiday settings for all the SLA templates that we had created (use mode Finnish holidays. At the moment, holidays are not included in the SLA time. Lesson 5: Avoid too many alert messages (ID, AR, O), Store knowledge. During the configuring the SLA module, the research team found a bug which increases the number of alert messages remarkably. The large number of alerts was addressed by several persons who had received alert messages. The problem was that one message is repeatedly sent to the receivers in a situation where 1) an SLA time rule has been exceeded and 2) user makes changes to the incident. This bug had been identified by the case organization’s other business unit. The bug was reported to the ITSM tool provider. Lesson 6: The number of SLA rules increases rapidly (O), Identify knowledge. Even in a simple SLA case (6 products used by one customer) that we had, the number of SLA rules started to increase fast. There were 4 priority levels and for each priority level we needed to configure a response time rule and a resolution time rule. Both a response time rule and a resolution time rule required SLA warning alert and SLA breach alert. Thus, organizations should be careful in offering customized SLAs to customers. In our case, we had to think which of the alerts really create value. Lesson 7: There is a need for advanced SLA reports (AR, O), Identify/Use knowledge. ITSM tool doesn’t allow user to create own SLA report templates but forces user to use the built-in report template which isn’t editable. User can still specify the time period from which the cases will be taken and choose from which kind of cases he or she wants more details (example cases which weren’t solved by the end of the resolution time). 143
  • 6. Lesson 8: Service level management requires defined services and service catalogue (ID, O), Identify knowledge. Discussions with the case organization’s representatives re- vealed that the concept ’service catalogue’ was not very visible in the organization. However, we observed that instead of the service catalogue, employees were familiar with the concepts ’product portfolio’ and ’product catalogue’. The above mentioned lessons learnt are not presented in a priority order. Many of the observations were related to configuration work of the SLA module. We found that in some points creating and maintaining service level agreements with the ITSM tool of case organization was not effective because the tool forced users to do many tasks manually, for example, a user is not able to make copies of created lists (states or users) which are used multiple times in different SLA time rules). Moreover, several settings are hard to find (they remain hidden behind many menus) if the user doesn’t have a good knowledge of the tool. The observations that we made on SLM practices indicate that the organization had an ITIL-based process framework with documented SLM practices. However, these practices were not very visible in the daily work of the employees. Regarding the SLM roles, there were not a clear assignment of Service Level Manager but Customer Responsible persons seemed to be prepared for performing SLM activities, such as discuss service level achievements with customers. 5. Conclusion The main objective of this paper was to answer the research problem: how Service Level Agreements can be implemented with an IT service management tool. A case study and action research methods with a single case were used in this study. The case organization Tieto is one of the leading IT service companies in Scandinavia and one of the KISMET project’s industrial partners. The main contribution of this paper was to describe the phases how SLA rules were implemented and present lessons learnt from the project. Despite the small tool-related difficulties, the SLA pilot study was considered to be a success. After the study, the case organization had the SLA module in use for the selected customer, guidelines and competence how to create new SLA rules, and increased knowledge on the limitations of the ITSM tool regarding the SLA module. Using a case study research method includes certain lim- itations. First, this case study was performed with one case organization which means that the results of this study might not be generalizable with other case studies. Second, we carried out a study within a relatively short research period (1,5 months). A longer research period would have provided valuable information how other teams of the case organization introduce SLM methods. Third limitation is related to data collection. We could have interviewed more people related to the SLM process, such as sales persons. Further research could focus on comparing service level management practices between IT service provider organiza- tions. It would also be interesting to study whether there are open source tools for service level management and whether those tools could be integrated to the existing service desk systems. Acknowledgment This paper is based on research in KISMET project funded by the National Technology Agency TEKES (no. 70035/10), European Regional Development Fund (ERDF), and industrial partners. References [1] OGCc, ITIL Service Transition. The Stationary Office, UK, 2007. [2] OGCe, ITIL Continual Service Improvement. The Stationary Office, UK, 2007. [3] OGC, ITIL Service Strategy. The Stationary Office, UK, 2007. [4] COBIT 4.1, Control Objectives for Information and related Technology: COBIT 4.1. IT Governance Institute, 2007. [5] ISO/IEC, ISO/IEC FDIS 20000:1. ISO/IEC JTC 1 Secretariat: ANSI, 2010. [6] OGCb, ITIL Service Delivery. The Stationary Office, UK, 2002. [7] OGCb07, ITIL Service Design. The Stationary Office, UK, 2007. [8] J. Caldeira and F. B. e Abreu, “Influential factors on incident manage- ment: Lessons learned from a large sample of products in operation,” in Product-Focused Software Process Improvement, A. Jedlitschka and O. Salo, Eds., vol. 5089. Springer Verlag, 6 2008, pp. 330–344. [9] M. Jäntti, “Defining requirements for an incident management system: A case study,” in Proceedings of the Fourth International Conference on Systems (ICONS 2009). IEEE Computer Society, 2009. [10] M. Jäntti, “Lessons learnt from the improvement of customer support processes: A case study on incident management,” in Product-Focused Software Process Improvement, ser. Lecture Notes in Business Informa- tion Processing, W. Aalst, J. Mylopoulos, N. M. Sadeh, M. J. Shaw, C. Szyperski, F. Bomarius, M. Oivo, P. Jaring, and P. Abrahamsson, Eds. Springer Berlin Heidelberg, 2009, vol. 32, pp. 317–331. [11] M. Kajko-Mattsson, “Corrective maintenance maturity model: Problem management,” in ICSM ’02: Proceedings of the International Conference on Software Maintenance (ICSM’02). Washington, DC, USA: IEEE Computer Society, 2002, p. 486. [12] J. Graham and B. Hart, “Knowledge integration with a 24-hour help desk,” in SIGUCCS ’00: Proceedings of the 28th annual ACM SIGUCCS conference on User services. New York, NY, USA: ACM Press, 2000, pp. 92–95. [13] A. A. Latif, M. M. Din, and R. Ismail, “Challenges in adopting and integrating itil and cmmi in ict division of a public utility company,” Computer Engineering and Applications, vol. 1, pp. 81–86, 2010. [14] M. Mohamed, V. Ribiere, K. O’Sullivan, and M. Mohamed, “The re- structuring of the information technology infrastructure library (itil) implementation using knowledge management framework,” The Journal of Information and Knowledge Management Systems, vol. 38, no. 3, pp. 315–333, 2008. [15] W.-G. Tan, A. Cater-Steel, and M. Toleman, “Implementing it service management: A case study focussing on critical success factors,” Journal of Computer Information Systems, vol. 50, no. 2, 2009. [16] T. Barroero, G. Motta, and M. Durante, “Sustainable service level agreements,” in Services Computing (SCC), 2011 IEEE International Conference on, july 2011, pp. 679–684. [17] M.-C. Hsueh, “Adaptive service level management,” in Enterprise Dis- tributed Object Computing Conference, 2007. EDOC 2007. 11th IEEE International, oct. 2007, p. 451. [18] CEN Workshop Agreement CWA 14924-1, European Guide to Good Practice in Knowledge Management, Part 1. European Committee for Standardization, 2004. [19] R. Yin, Case Study Research: Design and Methods. Beverly Hills, CA: Sage Publishing, 1994. [20] K. Eisenhardt, “Building theories from case study research,” Academy of Management Review, vol. 14, pp. 532–550, 1989. [21] Sysart, Requeste User Guide: Service Level Agreements, 2012. 144