SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 6, December 2021, pp. 5292~5300
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i6.pp5292-5300  5292
Journal homepage: http://ijece.iaescore.com
From IT service management to IT service governance: An
ontological approach for integrated use of ITIL and COBIT
frameworks
Lamia Moudoubah, Abir El Yamami, Khalifa Mansouri, Mohammed Qbadou
Laboratory Signals, Distributed Systems and Artificial Intelligence (SSDIA), ENSET Mohammedia, University Hassan II
of Casablanca, Morocco
Article Info ABSTRACT
Article history:
Received Aug 25, 2020
Revised Apr 13, 2021
Accepted May 11, 2021
Some companies have achieved better performance as a result of their IT
investments, while others have not, as organizations are interested in
calculating the value added by their IT. There is a wide range of literature
that agrees that the best practices used by organizations promote continuous
improvement in service delivery. Nevertheless, overuse of these practices can
have undesirable effects and unquantified investments. This paper proposed a
practical tool formally developed according to the DSR design science
approach, it addresses a domain relevant to both practitioners and academics
by providing IT service governance (ITSG) domain model ontology,
concerned with maximizing the clarity and veracity of the concepts within it.
The results revealed that the proposed ontology resolved key barriers to
ITSG process adoption in organizations, and that combining COBIT and
ITIL practices would help organizations better manage their IT services and
achieve better business-IT alignment.
Keywords:
COBIT
IT service governance
IT service management
ITIL
Ontology
This is an open access article under the CC BY-SA license.
Corresponding Author:
Lamia Moudoubah
SSDIA laboratory, ENSET Mohammedia
Hassan II University of Casablanca
Casablanca, Morocco
Email: lamiae.modobah@gmail.com
1. INTRODUCTION
The thinking behind the ITSM principle is to solve the difficulties associated with managing IT
services in the enterprise. It has been observed that the proliferation of IT infrastructures makes companies
dependent on the quality, quantity and availability provided by these infrastructures. In other words, due to
the divergence in the "IT is business" or "business is IT" view, the design of IT infrastructure focuses on
technology rather than a rational and efficient customer-oriented approach [1].
This paper is an attempt to fill the void, the objective is to build a collective mapping of ITSG best
practices using the collection and synthesis of data from the official IT governance framework guides. This
mapping needs to be formal, extensive, and reproducible so that it can be shared with applications that are
smart, other areas of expertise, or IT qualified. According to [2], "COBIT alone is not sufficient to meet the
requirements of business/IT coordination.
COBIT only provides a governance mode, not the information system of an organization. On the
other hand, ITIL is becoming the default standard for IT management in organizations, providing a
comprehensive framework for the IT service lifecycle and can help organizations improve their performance.
The objective of this work is to submit an ontological approach for a combined exploitation of COBIT and
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5293
ITIL practices. This approach is elaborated by respecting the research methodology of design science (DSR).
The objective is to translate known practices into desirable situations via the deployment of technological
artifacts. The lack of relevance of scientific research in the field of information systems for professionals has
favored the birth of the concept of study in design science (DSR).
A collection of concepts, methods, and approaches to conduct studies can be described as DSR
methodology [3]. Its aim is to close the gap between technical awareness of the requesters and the practical
knowledge of the experts. Information systems specialists can benefit through using this approach knowledge
from different computer science, engineering, social science, economics and philosophy to study problems at
the crossroads of computer science as well as entities [4]. As a result, organizations will be capable of dealing
with critical information-related activities by creating and evaluating innovative computing artifacts [5].
DSR specifies 4 design artifacts (construction, model, method and instantiation). This contribution
focuses on the construct and the model. The construct describes the terminology of the problem domain [6],
while the model uses constraints to represent the current situation, the design problem, and the possible
solutions [7].
The proposed control is made up of constructs and service level management artifacts. The model in
this paper is defined by integrating different constructs to develop our alternative for the ITSG lifecycle. The
following is how the rest of the article is organized: section 2 provides an overview of the ITIL and COBIT
structures, followed by section 3 discussion of relevant work, section 4 presentation of our ITSG lifecycle
ontology, and section 5 discussion of our solution's evaluation mechanisms. Finally, in section 6, we discuss
the findings of our approach before coming to a conclusion in section 7.
2. RELATED WORKS
While it is still relatively new, the field of IT governance has its own set of skills system as well as
numerous technologies and methods [8]. The quantity of IT governance best practice constructs has grown;
each framework comes from a professional community with its own challenges and culture. The professional
literature provides various books, catalogs, and journal guides for applying these frameworks [9].
The development of best practice frameworks such as COBIT or ITIL, as well as the publication of
standards such as ISO 27001, which deals with IT security management, have resulted from the IT
governance problems that are primarily discussed in management reviews. In this regard, CIGREF states in a
technical publication that the diversity of IT governance principles and structures is frequently a source of
conflict and misunderstanding [10].
Similarly, Samiotakis [11] highlighted a point that is marginally addressed in the literature, which is
the difficulty of applying and integrating multiple IT governance standards and frameworks: according to
Smirnov et al. [12] "frameworks cannot simply be combined like puzzle pieces. They were created by
different people, at different times, in different places, deliverables/aspects/outcomes, with varying degrees
of granularity, precision, quality and consistency" [13].
In this context, Shing et al. [13] provide ITIL v3 - COBIT 5 process mapping, according to authors:
“When used together, the power of both approaches is amplified, with a greater likelihood of management
support, direction, and a more cost-effective use of implementation resources”. Likewise, this paper aims to
provide an integrated framework of ITSG on the basis of the most widely accepted best practices frameworks
COBIT and ITIL in [14]-[19]. The purpose is to provide a machine readable document for ITSG domain
model. Ontology can be used to create a formal definition of domain semantics since it is a formal and
explicit specification of a shared conceptualization [20].
Ontology is also described as a more formal and constructive specification. Conceptualization of
sharing knowledge representation, which can build the vocabulary and its structure Work around a clearly
defined consensus [21]. It aims to interweave human understanding of symbols with their machine
processing capabilities. In terms of IT service management, built and created a prototype decision-making
framework based on business needs for IT governance planning developed a new integration approach for
representing the lifecycle of cloud-based IT services and demonstrated how to use it to simplify cloud service
acquisition and use [22], [23].
Conger et al. [23] Proposed the ontology meta-model of ISO 27001 security standard, which
explained its basic concepts to compare the constructed meta-model with various existing information
security ontologies. Ontology for secure SLA representation (SSLA) was developed to address concerns about
cloud security and privacy risk assessment [24]. The following section will present the proposed ITSG domain
ontology in detail. The goal is to maximize the expressiveness, clarity, and authenticity of the concepts
belonging to it [25].
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5294
3. PROPOSED IT SERVICE GOVERNANCE ONTOLOGY
Planning, research, construction, and testing are all phases of traditional service management
models. These methodologies have been found to be very time consuming and to necessitate a significant
amount of human labor, both from the user and the supplier. ITSG is very different form ITSM; COBIT 5
clarifies the differences in its principle 5 “separating governance from management” by recognizing that each
serves a different purpose with different responsibilities and different activities. Since a formal definition of
ITSG does not exist, choosing the best ITSG mechanisms is a difficult task. Isolated issues are resolved as
they arise, and those individual solutions can often conflicting each other.
Yet, this section aims to make an ontological representation of ITSG domain supported the
gathering and analysis of knowledge contained in ITG hottest frameworks. The most goal of ITSG ontology
is to represent concepts of ITSG domain, also as their properties and relations. So as to develop the ITSG
ontology, a set information purification, coordination, research, and presentation. The ITGI’s official COBIT
(ISACA, 2020) and ITIL guides were used as sources of data.
Figure 1 introduces the ITSG suggested model, It is based on a mix of COBIT process: “Define and
manage service levels” and ITIL process “service level management”. The main objective is to separate
control from management as it is highlighted by COBIT V5 principles. The service level control (SLC) is the
process for establishing a shared understanding of the appropriate level of service, both consumer and
provider to prevent misunderstandings or omissions, it is important to have a better understanding of roles
and responsibilities. The process of recording and agreeing on service targets in service level agreements
(SLAs), then tracking and updating real service levels against those targets is known as service level
management (SLM). The ontological representation of each process domain is described in the subsection
below.
Figure 1. The proposed ITSG model
3.1. Service level control artefact
Process objective: to develop a shared understanding of the necessary level of service.
Process description: The central entity type is the IT process: DS1: define and manage IT services,
this process belongs to COBIT IT domain “delivery and support” and it is defined by the business objective
“Establishing a shared understanding of the level of service required”.
COBIT provides a maturity profile for this process based on a ranking of just six maturity level
entity type elements (0 non-existent, 1 initial/ad Hoc, 2 repeatable but intuitive, 3 specified process, 4
controlled and observable, 5 optimized).
COBIT proposes a set of detailed control objectives for the control of formal SLA; it defines the
aspects of SLA, the aspects of success processes, tracking, and reporting, the review of SLA and service
improvement program.
COBIT expounds a set of Key goal indicators and key performance indicators for each IT process it
does not, however, specify how to report these indicators. To do so, organizations must adopt other IT
frameworks. In our case, ITIL framework is adopted for managing service levels. The ontological
representation of service governance domain knowledge is shown in Figure 2.
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5295
Figure 2. Service level control process ontology
3.2. Service level management artefact
The SLM artefact is designed based on the combination of ITIL SLM practices and COBIT DS1
detailed control objectives. For that aim, 3 SLM processes are developed and are presented below.
3.3. Identification of service requirements
Process Goal: Gather criteria for new IT services or changes to existing IT services from the
consumer's perspective. The goal is to strengthen relationships with happy customers so that IT resources can
be spent on the areas that the customer considers most important.
Application services, technical services, and professional services are the three types of services that
are identified by a service name and a service description. Three service levels should be specified for each
service: Gold, Silver, and Bronze. The service levels are determined by the metrics that measure the quality
of the service.
The user may request a service level change during this process, according to ITIL. To do so, the
user must first identify the QoS specifications, which include things like availability: (number of allowed
downtimes, availability thresholds, number of interruptions allowed, procedures for announcing interruptions
to the service…), performance requirements: (implementation Duration continuity: (availability to be
recovered,…) required capacity for the service, response time from applications,…), and service desk
(incident response time, problem response time,…).
COBIT indicates that the conditions for service should be registered and subjected to a preliminary
assessment by the service level manager, so that alternatives may be validated latter by the business unit
strategic. The objective is to eliminate those services that cannot be aligned with key business objectives and
keep only those who can be possibly validated by the strategic business unit. The ontological representation
of the SLM Process: “identification of service requirements” domain knowledge is shown in Figure 3.
Figure 3. The service level requirements management method' ontology
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5296
3.4. Agrements SIGN-OFF and service activation
Process goal: Verify service acceptance and ensure that both the supplier and the customer sign off
on service contracts. ITIL points out that once the service quality metrics are met, a contract between the
service customer and the service provider is used as a basis for billing or cost allocation, and it helps explain
what value customers are getting for their money. This procedure guarantees that all relevant operational
compliance undertakings (OLAs) are authorised by their service operators, as well as that the receiver
approves the strategic compliance agreement (SLA). The ontological representation of the SLM Process:
"Agreements sign-off and service activation" domain awareness is depicted in Figure 4.
Figure 4. Ontology for signing off on agreements and activating services
3.5. Service level monitoring and reporting
Process Goal: To enhance service quality, track achieved service levels and compare them to
agreed-upon service level goals. COBIT emphasizes the importance of appointing a service level manager
who is responsible for monitoring and reporting on the achievement of the established service performance
standards as well as any problems encountered during processing. The service level manager initiates a
service inspection session in this process, with the goal of identifying the root cause of weak areas so that
remedial action (root cause resolutions) can be taken, thus enhancing potential service quality.
The service level manager can submit customer satisfaction surveys on a regular basis to find areas
where work quality can be enhanced. A service level report is produced following the service level
monitoring session and distributed to consumers and other relevant parties as a basis for service quality
improvement measures. The ontological representation of the SLM Process: “Service Level Monitoring and
Reporting” domain awareness is depicted in Figure 5.
Figure 5. Service level monitoring and reporting process ontology
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5297
4. ARTEFACT EVALUATION
4.1. Ontology taxonomy evaluation
ITSG ontology has been implemented in protégé software [26] to test the proposed ITSG artefact for
inconsistency, incompleteness, and redundancy, and the credibility has been checked using the inference
engines Fact++1.6.5 [27] and Pellet [28] incorporated as plug-ins in protégé software. Figure 6 shows the
inferred classes that were created.
Figure 6. ITSG ontology inferred classes
4.2. Domaine knowledge validation
The goal of the suggested ontology was enabling an ITSG system which integrates COBIT and ITIL
practices dedicated to service management. In order to validate our proposed alternative domain knowledge,
it is mandatory to check if ITSG key performance indicators (KPIs) provided by COBIT can be calculated
through the proposed ITSG system. Jena Fuseki Server 3.4.0 was used to demonstrate our ontology-based
approach for this purpose. Jena Fuseki is a SPARQL server that uses the SPARQL protocol over HTTP to
provide REST-style SPARQL HTTP updates, SPARQL queries, and SPARQL updates. The ontology data
was populated using Protégé tools. This is then translated to XML/OWL format and submitted to Jena Fuseki
Server to be sorted as a dataset.
5. RESULTS AND DISCUSSION
In general, governance refers to an organization's ability to monitor and normalize its activities in
order to prevent conflicts of interest among its various stakeholders. IT governance, in particular, refers to the
methods for managing and regulating an organization's information system. According to Yamami et al. [29]
“governance is the combination of steering and control, steering to ensure that today's decisions are preparing
properly tomorrow, and control to measure the gap from what was planned.” In this paper, we are interested
in IT service Governance models implementation in organizations. ITIL is the most used framework in
organizations, according to Leoz et al. [30] organizations tend to implement ITIL for management purpose;
they are limited to adopting the processes of incident response, issue resolution, process improvement and the
function of service desk.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5298
The service level agreement process is often neglected since it can put strain on IT departments. Yet,
the SLA process is highly dependent to the other processes. We present through Figure 7 the relationship
between the SLA process and the other processes of ITIL framework [29].
Figure 7. Relationship between ITIL processes
Indeed, implementing ITSG processes t is not an easy job since its definition and role are not clear.
This work aims to provide in this sense a comprehensive method for the control of ITSM components since
the identification of service requirements phase up to the reporting of services. Even though there is an
increasing amount of research dealing with ITSM, a complete ITSG ontology does not exist. As a result,
creating a shared representation is needed of IT service control concepts and to show how these concepts
relate to ITSM problems in information systems engineering.
The aim is to provide a machine-readable text for the ITSG domain model, which will be added to
the technical literature. Second, to the scientific literature concerned with enhancing IT governance systems
through a better understanding of their architectures. Similarly, the ITSG ontology's main goal is to represent
ITSG domain concepts, their properties, and relationships, to create a shared representation of ITSG concepts
among researchers and practitioners, to demonstrate how these concepts relate to ITSM problems, to make
ITSG knowledge reusable in similar information systems engineering situations, and to support the
development of new ITSG modes.
To meet these needs, the most widely used IT governance frameworks, COBIT and ITIL, have been
integrated. COBIT practices are used for the audit and control perspective, while ITIL practices take the
service management perspective. The objective is to distinguish control from management, as emphasized by
COBIT V5. The ITSG ontology is formally developed according to the DSR approach. The proposed objects
are designed using COBIT best practices (DS1: Define and manage service levels) and ITIL best practices
(service level management). They were used to search for inconsistency, incompleteness, and redundancy in
the safe applications. The inference engines Fact ++ and Pellet were used to verify the credibility.
While COBIT defines a set of key performance indicators for the DS1 phase, it does not specify
how these indicators should be reported. The Jena Fuseki server was used to manage the ITSG SPARQL
queries in order to validate the proposed ontological domain information. It turns out that with the proposed
ITSG alternative, the COBIT DS1 KPIs can be calculated efficiently as shown in Table 1. This leads to the
belief that a combination of ITIL and COBIT processes can lead to a substantial change in service quality and
improved Business-IT service alignment.
By sharing ITSG knowledge, the expertise of ITG practices is used in the organization, and
coordination between external providers and consumers is improved. The results are expected to contribute to
the development of IT governance frameworks for use by non-specialized IT governance executives in
companies, and to minimize the bureaucracy of IT executives. The proposed artifact may be a paradigm shift
in how information management frameworks are integrated to meet the needs of organizations. By
recognizing existing waste, ITIL and Lean IT practices can be combined to ensure that IT processes operate
effectively, safely, and efficiently.
Int J Elec & Comp Eng ISSN: 2088-8708 
From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah)
5299
Table 1. Explains the SPARQL queries that were used to calculate COBIT DS1 phase KPIs
KPI 1 : Resolution of a service level update request with a time lag
SELECT *
WHERE {
?consumer o:initiates ?request.
?request o:requests ?SL.
?request o:request_date ?requestDate.
?request o:response_date ?responseDate.
BIND (?responseDate - ?requestDate as ?resolutionTimeLag).
?request o:request_decision ?decision.
FILTER (?decision ="resolved").
}
KPI 2: Consumer satisfaction surveys are conducted on a regular
basis.
SELECT (COUNT(*) as ?surveyFrequency ) ?consumer
WHERE {
?consumer o:repliesTo ?survey .
?survey o:survey_date ?s.
BIND ( YEAR(?s) as ?year).
BIND (xsd:string(?year) as ?y).
FILTER ( ?y ="2017").
}
GROUPBY ?consumer
KPI 3: The amount of time it takes to fix a service level problem
SELECT ?SL ?rootCauseAnalyses ?rootCauseResolution
?resolutionTimeLag
WHERE {
?rootCauseAnalyses o:analyses ?SL.
?RCR o:resolves ?SL.
?rootCauseAnalyses o:RCA_date_begin ?RCADB.
?rootCauseResolution o:RCR_date ?RCRD.
BIND ( ?RCRD - ?RCADB as ?resolutionTimeLag).
}
KPI4: Number of times that cause analysis of service level
procedures and subsequent resolution is completed within required
period
SELECT ( COUNT(*) as ?numberOfcompletedRCA )
WHERE {
?rootCauseAnalyses o:analyses ?SL.
?rootCauseResolution o:resolves ?SL.
?rootCauseAnalyses o:RCA_expected_date_end ?RCAEDE.
?rootCauseResolution o:RCR_date ?RCRD.
FILTER ( ?RCRD < ?RCAEDE).
}
KPI5: The importance of the additional funding required to meet
the specified service level
SELECT *
WHERE {
?RootCauseResolution o:resolves ?SL.
?RootCauseResolution o:RCR_cost ?RootCauseResolutionCost.
}
6. CONCLUSION
The problem of applying IT best practices to determine the contribution of IT investments to
business value has received increasing attention from practitioners and academics in recent decades. IT
governance has emerged as a response to this issue. Organizations must adopt the structures and processes
necessary to ensure that only services aligned with strategic business objectives are approved and prioritized.
Adopting these processes, however, is difficult due to a lack of clarity in their meaning and function.
This paper proposes an alternative to the ITSG system by presenting an ontology that has been formally
constructed using the DSR approach and aims to formalize ITG knowledge. The aim was to clear up any
misconceptions about the ITSG model implementation's intent.
The ontology scheme was designed and evaluated using the Protégé program. SPARQL queries on
the JENA FUSEKI server successfully validated the proposed ITSG domain ontology. The obtained results
reveal that the proposed ontology enables effective control of IT services and may result in substantial
progress in service quality and improved alignment of IT and business services.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300
5300
REFERENCES
[1] W. Hanchul, S.-J. Jeong, and J.-Ho Huh, "Improvement of ITSM it service efficiency in military electronic
service," Journal of Information Processing Systems, vol. 16, no. 2, pp. 246-260, 2020, doi: 10.3745/JIPS.03.0134.
[2] Z. Dong and Z. Chao, "Adoption of COBIT 5 and ITIL in Small and Medium Size Enterprises in China," Thesis,
School of Engineering, Jönköping, 2014.
[3] L. Aleš, H. Tomaž, and P. Andreja, "IT governance mechanisms and contingency factors: Towards an adaptive IT
governance model," Organizacija, vol. 51, no. 4, pp. 286-310, 2018, doi: 10.2478/orga-2018-0024.
[4] A. Hevner, R. Alan, S. T. March, T. Salvatore, and J. Park, "Design Science in Information Systems Research,"
MIS Quarterly, vol. 28, no. 1, pp. 75-105, 2004.
[5] D. Ajantha and T. Bernhard, "Enriching Conceptual Modelling Practices through Design Science," International
Conference on Exploring Modeling Methods for Systems Analysis and Design-BPMDS 2011, vol. 81, 2011,
pp. 497-510.
[6] S. Michael, B. Tilo and K. Helmut, "Explicating design theories with conceptual models: Towards a theoretical role
of reference models," Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik, Physica-Verlag HD,
pp. 175-194, 2009, doi: 10.1007/978-3-7908-2336-3_9
[7] S. A. Herbert “The sciences of the artificial,” MIT press, 2019.
[8] CIGREF, "IT frameworks," CIGREF, 2009. Accessed, 10 4 2016. [Online]. Available:
http://www.cigref.fr/cigref_publications/RapportsContainer/Parus2009/Referentiels_de_la_DSI_CIGREF_2009.pdf
[9] R. R. Ben, " The effects of the multiplicity of standards and repositories of good practice: the case of the
Information Systems Department," (in France) Thèse de doctorat, Conservatoire national des arts et metiers-
CNAM, 2015.
[10] B. Barafort, A. -L. Mesquida, and A. Mas, "Integrating risk management in IT settings from ISO standards and
management systems perspectives," Computer Standards & Interfaces, vol. 54, Part 3, pp. 176-185, 2017, doi:
10.1016/j.csi.2016.11.010.
[11] M. Samiotakis, "Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery," 6th itSMF South
East Europe Conference, Athens, Greece, 2013.
[12] A. Smirnov, A. Ponomarev, N. Shilov, A. Kashevnik, and N. Teslya, "Ontology-based human-computer cloud for
decision support: architecture and applications in tourism," International Journal of Embedded and Real-Time
Communication Systems (IJERTCS), vol. 9, no. 1, pp. 1-19, 2018, doi: 10.4018/IJERTCS.2018010101.
[13] L. C.-Shing, J. Z.-Wei, and H. L.-Kai, "A fuzzy ontology and its application to news summarization," IEEE
Transactions on Cybernetics, vol. 35, no 5, pp. 859-880, 2005, doi: 10.1109/TSMCB.2005.845032.
[14] C. Office, “ITIL service strategy,” Norwich: the Stationery Office (TSO), 2011.
[15] C. Office, “ITIL Service Design,” Norwich: the Stationery Office (TSO), 2011.
[16] C. Office, “ITIL Service Transtion,” Norwich: the Stationery Office (TSO), 2011.
[17] C. Office, “ITIL service Operation,” Norwich: the Stationery Office (TSO), 2011.
[18] C. Office, “ITIL Continual service imprivement,” Norwich: the Stationery Office (TSO), 2011.
[19] A. EL Yamami, "Representing IT Projects Risk Management Best," Engineering, Technology & Applied Science
Research, vol. 7, no. 5, pp. 2062-2067, 2017, doi: 10.48084/etasr.1340.
[20] L. X.-Wen, L. X.-Chun, and H. Ke-Jin, "Design and implementation of IT governance planning decision supporting
system," CCDC'09: Proceedings of the 21st annual international conference on Chinese control and decision
conference, 2009, pp. 5665-5668.
[21] K. Joshi, Y. Yesha, and T. Finin, "Automating Cloud Services Lifecycle through Semantic technologies," IEEE
Transactions on Services Computing, vol. 7, no. 1, pp. 109-122, 2013, doi: 10.1109/TSC.2012.41.
[22] C.-Yu Lee, K. M. Kavi, R. A. Paul, and M. Gomathisankaran, "Ontology of Secure Service Level Agreement,"
IEEE 16th International Symposium on High Assurance Systems Engineering (HASE 2015), Daytona Beach,
Florida, USA, 2015, pp. 166-172, doi: 10.1109/HASE.2015.33.
[23] S. Conger, M. Winniford and L. Erickson-Harris, "Service management in operations," AMCIS 2008 Proceedings,
Canada, p. 362, 2008.
[24] M. A. Mark, “The protégé project: a look back and a look forward,” AI matters, vol. 1, no 4, p. 4-12, 2015, doi:
10.1145/2757001.2757003.
[25] K. Building, "Fact ++," School of Computer Science University of Manchester, 2021. [Online]. Available:
http://owl.man.ac.uk/factplusplus/.
[26] Pellet, “Clark & Parsia, LLC,” 2021. [Online]. Available: http://pellet.owldl.com/
[27] A. Jena, "Jena Fuseki Server," Apache Software Foundation, 2021. [Online]. Available:
https://jena.apache.org/documentation/fuseki2/index.html.
[28] H.Österle et al., "Memorandum on Design-Oriented Information Systems Research," European Journal of
Information Systems, vol. 20, pp. 7-10, 2011.
[29] A. El Yamami, K. Mansouri, M. Qbadou, and El H. Illoussamen, “Multi-objective IT project selection model for
improving SME strategy deployment,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no 2, pp. 1102-1011, 2018, doi: 10.11591/ijece.v8i2.
[30] G. De Leoz and S. Petter, "Considering the social impacts of artefacts in information systems design science
research," European Journal of Information Systems, vol. 27, no. 2, pp. 154-170, 2018, doi:
10.1080/0960085X.2018.1445462.

More Related Content

What's hot

Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionCisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionSplunk
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingRob Akershoek
 
IT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentIT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentEryk Budi Pratama
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsMauricio 'MJ' Jimenez
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
機械学習応用システムセキュリティガイドライン―背景と公開について
機械学習応用システムセキュリティガイドライン―背景と公開について機械学習応用システムセキュリティガイドライン―背景と公開について
機械学習応用システムセキュリティガイドライン―背景と公開についてNobukazu Yoshioka
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Maxime CARPENTIER
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKMITRE ATT&CK
 
あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~
あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~
あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~pcl-lab
 
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دومارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دومMahdi Sayyad
 
OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))
OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))
OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))Yuki Koike
 
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITILIT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITILAlfid Ardyanto
 
Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...
Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...
Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...Obeo
 
ISMS Awareness IT Staff
ISMS Awareness IT StaffISMS Awareness IT Staff
ISMS Awareness IT StaffTooba Khaliq
 

What's hot (20)

Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionCisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
 
ITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT MappingITIL,COBIT and IT4IT Mapping
ITIL,COBIT and IT4IT Mapping
 
IT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability AssessmentIT Governance - COBIT 5 Capability Assessment
IT Governance - COBIT 5 Capability Assessment
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
210508 legaltech
210508 legaltech210508 legaltech
210508 legaltech
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 Steps
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
機械学習応用システムセキュリティガイドライン―背景と公開について
機械学習応用システムセキュリティガイドライン―背景と公開について機械学習応用システムセキュリティガイドライン―背景と公開について
機械学習応用システムセキュリティガイドライン―背景と公開について
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
ITIL vs. COBIT
ITIL vs. COBITITIL vs. COBIT
ITIL vs. COBIT
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 
あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~
あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~
あらゆる風車に適用可能な状態監視技術を目指して~風車主要機器におけるデータ駆動型異常検知とその評価~
 
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دومارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
ارزیابی امنیتی محصولات فناوری اطلاعات(ISO 15408 Common Criteria)- بخش دوم
 
OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))
OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))
OpenSIM 筋骨格シミュレーション 基本の解析マニュアル(改訂1))
 
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITILIT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
IT Control Objectives Framework, A Relationship Between COSO Cobit and ITIL
 
Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...
Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...
Capella Days 2021 | Introduction to CAPELLA/ARCADIA and NASA Systems Engineer...
 
ISMS Awareness IT Staff
ISMS Awareness IT StaffISMS Awareness IT Staff
ISMS Awareness IT Staff
 

Similar to From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks

Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkIJCSIS Research Publications
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
 
How cobit can complement itil to achieve BIT
How cobit can complement itil to achieve BITHow cobit can complement itil to achieve BIT
How cobit can complement itil to achieve BITecij
 
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT ecij
 
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...guest418d60a0
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
 
Developing a new architecture to improve itsm on cloud computing environment
Developing a new architecture to improve itsm on cloud computing environmentDeveloping a new architecture to improve itsm on cloud computing environment
Developing a new architecture to improve itsm on cloud computing environmentijccsa
 
Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...IJECEIAES
 
IT Carve-out Projects: Towards a Maturity Model
IT Carve-out Projects: Towards a Maturity ModelIT Carve-out Projects: Towards a Maturity Model
IT Carve-out Projects: Towards a Maturity ModelNaoufal El Jaouhari
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONacijjournal
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...CSITiaesprime
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONacijjournal
 
Whitepaper - IoT Maturity Model (IoTMM)
Whitepaper  - IoT Maturity Model (IoTMM)Whitepaper  - IoT Maturity Model (IoTMM)
Whitepaper - IoT Maturity Model (IoTMM)Pablo Junco
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...idescitation
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technologyKHakash
 
A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...Carrie Cox
 
Core model of information technology governance system design in local govern...
Core model of information technology governance system design in local govern...Core model of information technology governance system design in local govern...
Core model of information technology governance system design in local govern...TELKOMNIKA JOURNAL
 

Similar to From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks (20)

Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...
 
How cobit can complement itil to achieve BIT
How cobit can complement itil to achieve BITHow cobit can complement itil to achieve BIT
How cobit can complement itil to achieve BIT
 
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
HOW COBIT CAN COMPLEMENT ITIL TO ACHIEVE BIT
 
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...Strengthening Employees Responsibility To Enhance Governance Of It   Cobit Ra...
Strengthening Employees Responsibility To Enhance Governance Of It Cobit Ra...
 
empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...empirical study on the status of moroccan information systems and proposition...
empirical study on the status of moroccan information systems and proposition...
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise IT
 
Developing a new architecture to improve itsm on cloud computing environment
Developing a new architecture to improve itsm on cloud computing environmentDeveloping a new architecture to improve itsm on cloud computing environment
Developing a new architecture to improve itsm on cloud computing environment
 
Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...Thriving information system through business intelligence knowledge managemen...
Thriving information system through business intelligence knowledge managemen...
 
IT Carve-out Projects: Towards a Maturity Model
IT Carve-out Projects: Towards a Maturity ModelIT Carve-out Projects: Towards a Maturity Model
IT Carve-out Projects: Towards a Maturity Model
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
 
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTIONEXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
EXPLORING THE LINK BETWEEN LEADERSHIP AND DEVOPS PRACTICE AND PRINCIPLE ADOPTION
 
Whitepaper - IoT Maturity Model (IoTMM)
Whitepaper  - IoT Maturity Model (IoTMM)Whitepaper  - IoT Maturity Model (IoTMM)
Whitepaper - IoT Maturity Model (IoTMM)
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
574An Integrated Framework for IT Infrastructure Management by Work Flow Mana...
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
 
A Case Study On Implementing ITIL In Business Organization Considering Busi...
A Case Study On Implementing ITIL In Business Organization   Considering Busi...A Case Study On Implementing ITIL In Business Organization   Considering Busi...
A Case Study On Implementing ITIL In Business Organization Considering Busi...
 
Core model of information technology governance system design in local govern...
Core model of information technology governance system design in local govern...Core model of information technology governance system design in local govern...
Core model of information technology governance system design in local govern...
 

More from IJECEIAES

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...IJECEIAES
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...IJECEIAES
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...IJECEIAES
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...IJECEIAES
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...IJECEIAES
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningIJECEIAES
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportIJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...IJECEIAES
 

More from IJECEIAES (20)

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 

Recently uploaded

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 

From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 6, December 2021, pp. 5292~5300 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i6.pp5292-5300  5292 Journal homepage: http://ijece.iaescore.com From IT service management to IT service governance: An ontological approach for integrated use of ITIL and COBIT frameworks Lamia Moudoubah, Abir El Yamami, Khalifa Mansouri, Mohammed Qbadou Laboratory Signals, Distributed Systems and Artificial Intelligence (SSDIA), ENSET Mohammedia, University Hassan II of Casablanca, Morocco Article Info ABSTRACT Article history: Received Aug 25, 2020 Revised Apr 13, 2021 Accepted May 11, 2021 Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment. Keywords: COBIT IT service governance IT service management ITIL Ontology This is an open access article under the CC BY-SA license. Corresponding Author: Lamia Moudoubah SSDIA laboratory, ENSET Mohammedia Hassan II University of Casablanca Casablanca, Morocco Email: lamiae.modobah@gmail.com 1. INTRODUCTION The thinking behind the ITSM principle is to solve the difficulties associated with managing IT services in the enterprise. It has been observed that the proliferation of IT infrastructures makes companies dependent on the quality, quantity and availability provided by these infrastructures. In other words, due to the divergence in the "IT is business" or "business is IT" view, the design of IT infrastructure focuses on technology rather than a rational and efficient customer-oriented approach [1]. This paper is an attempt to fill the void, the objective is to build a collective mapping of ITSG best practices using the collection and synthesis of data from the official IT governance framework guides. This mapping needs to be formal, extensive, and reproducible so that it can be shared with applications that are smart, other areas of expertise, or IT qualified. According to [2], "COBIT alone is not sufficient to meet the requirements of business/IT coordination. COBIT only provides a governance mode, not the information system of an organization. On the other hand, ITIL is becoming the default standard for IT management in organizations, providing a comprehensive framework for the IT service lifecycle and can help organizations improve their performance. The objective of this work is to submit an ontological approach for a combined exploitation of COBIT and
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5293 ITIL practices. This approach is elaborated by respecting the research methodology of design science (DSR). The objective is to translate known practices into desirable situations via the deployment of technological artifacts. The lack of relevance of scientific research in the field of information systems for professionals has favored the birth of the concept of study in design science (DSR). A collection of concepts, methods, and approaches to conduct studies can be described as DSR methodology [3]. Its aim is to close the gap between technical awareness of the requesters and the practical knowledge of the experts. Information systems specialists can benefit through using this approach knowledge from different computer science, engineering, social science, economics and philosophy to study problems at the crossroads of computer science as well as entities [4]. As a result, organizations will be capable of dealing with critical information-related activities by creating and evaluating innovative computing artifacts [5]. DSR specifies 4 design artifacts (construction, model, method and instantiation). This contribution focuses on the construct and the model. The construct describes the terminology of the problem domain [6], while the model uses constraints to represent the current situation, the design problem, and the possible solutions [7]. The proposed control is made up of constructs and service level management artifacts. The model in this paper is defined by integrating different constructs to develop our alternative for the ITSG lifecycle. The following is how the rest of the article is organized: section 2 provides an overview of the ITIL and COBIT structures, followed by section 3 discussion of relevant work, section 4 presentation of our ITSG lifecycle ontology, and section 5 discussion of our solution's evaluation mechanisms. Finally, in section 6, we discuss the findings of our approach before coming to a conclusion in section 7. 2. RELATED WORKS While it is still relatively new, the field of IT governance has its own set of skills system as well as numerous technologies and methods [8]. The quantity of IT governance best practice constructs has grown; each framework comes from a professional community with its own challenges and culture. The professional literature provides various books, catalogs, and journal guides for applying these frameworks [9]. The development of best practice frameworks such as COBIT or ITIL, as well as the publication of standards such as ISO 27001, which deals with IT security management, have resulted from the IT governance problems that are primarily discussed in management reviews. In this regard, CIGREF states in a technical publication that the diversity of IT governance principles and structures is frequently a source of conflict and misunderstanding [10]. Similarly, Samiotakis [11] highlighted a point that is marginally addressed in the literature, which is the difficulty of applying and integrating multiple IT governance standards and frameworks: according to Smirnov et al. [12] "frameworks cannot simply be combined like puzzle pieces. They were created by different people, at different times, in different places, deliverables/aspects/outcomes, with varying degrees of granularity, precision, quality and consistency" [13]. In this context, Shing et al. [13] provide ITIL v3 - COBIT 5 process mapping, according to authors: “When used together, the power of both approaches is amplified, with a greater likelihood of management support, direction, and a more cost-effective use of implementation resources”. Likewise, this paper aims to provide an integrated framework of ITSG on the basis of the most widely accepted best practices frameworks COBIT and ITIL in [14]-[19]. The purpose is to provide a machine readable document for ITSG domain model. Ontology can be used to create a formal definition of domain semantics since it is a formal and explicit specification of a shared conceptualization [20]. Ontology is also described as a more formal and constructive specification. Conceptualization of sharing knowledge representation, which can build the vocabulary and its structure Work around a clearly defined consensus [21]. It aims to interweave human understanding of symbols with their machine processing capabilities. In terms of IT service management, built and created a prototype decision-making framework based on business needs for IT governance planning developed a new integration approach for representing the lifecycle of cloud-based IT services and demonstrated how to use it to simplify cloud service acquisition and use [22], [23]. Conger et al. [23] Proposed the ontology meta-model of ISO 27001 security standard, which explained its basic concepts to compare the constructed meta-model with various existing information security ontologies. Ontology for secure SLA representation (SSLA) was developed to address concerns about cloud security and privacy risk assessment [24]. The following section will present the proposed ITSG domain ontology in detail. The goal is to maximize the expressiveness, clarity, and authenticity of the concepts belonging to it [25].
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5294 3. PROPOSED IT SERVICE GOVERNANCE ONTOLOGY Planning, research, construction, and testing are all phases of traditional service management models. These methodologies have been found to be very time consuming and to necessitate a significant amount of human labor, both from the user and the supplier. ITSG is very different form ITSM; COBIT 5 clarifies the differences in its principle 5 “separating governance from management” by recognizing that each serves a different purpose with different responsibilities and different activities. Since a formal definition of ITSG does not exist, choosing the best ITSG mechanisms is a difficult task. Isolated issues are resolved as they arise, and those individual solutions can often conflicting each other. Yet, this section aims to make an ontological representation of ITSG domain supported the gathering and analysis of knowledge contained in ITG hottest frameworks. The most goal of ITSG ontology is to represent concepts of ITSG domain, also as their properties and relations. So as to develop the ITSG ontology, a set information purification, coordination, research, and presentation. The ITGI’s official COBIT (ISACA, 2020) and ITIL guides were used as sources of data. Figure 1 introduces the ITSG suggested model, It is based on a mix of COBIT process: “Define and manage service levels” and ITIL process “service level management”. The main objective is to separate control from management as it is highlighted by COBIT V5 principles. The service level control (SLC) is the process for establishing a shared understanding of the appropriate level of service, both consumer and provider to prevent misunderstandings or omissions, it is important to have a better understanding of roles and responsibilities. The process of recording and agreeing on service targets in service level agreements (SLAs), then tracking and updating real service levels against those targets is known as service level management (SLM). The ontological representation of each process domain is described in the subsection below. Figure 1. The proposed ITSG model 3.1. Service level control artefact Process objective: to develop a shared understanding of the necessary level of service. Process description: The central entity type is the IT process: DS1: define and manage IT services, this process belongs to COBIT IT domain “delivery and support” and it is defined by the business objective “Establishing a shared understanding of the level of service required”. COBIT provides a maturity profile for this process based on a ranking of just six maturity level entity type elements (0 non-existent, 1 initial/ad Hoc, 2 repeatable but intuitive, 3 specified process, 4 controlled and observable, 5 optimized). COBIT proposes a set of detailed control objectives for the control of formal SLA; it defines the aspects of SLA, the aspects of success processes, tracking, and reporting, the review of SLA and service improvement program. COBIT expounds a set of Key goal indicators and key performance indicators for each IT process it does not, however, specify how to report these indicators. To do so, organizations must adopt other IT frameworks. In our case, ITIL framework is adopted for managing service levels. The ontological representation of service governance domain knowledge is shown in Figure 2.
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5295 Figure 2. Service level control process ontology 3.2. Service level management artefact The SLM artefact is designed based on the combination of ITIL SLM practices and COBIT DS1 detailed control objectives. For that aim, 3 SLM processes are developed and are presented below. 3.3. Identification of service requirements Process Goal: Gather criteria for new IT services or changes to existing IT services from the consumer's perspective. The goal is to strengthen relationships with happy customers so that IT resources can be spent on the areas that the customer considers most important. Application services, technical services, and professional services are the three types of services that are identified by a service name and a service description. Three service levels should be specified for each service: Gold, Silver, and Bronze. The service levels are determined by the metrics that measure the quality of the service. The user may request a service level change during this process, according to ITIL. To do so, the user must first identify the QoS specifications, which include things like availability: (number of allowed downtimes, availability thresholds, number of interruptions allowed, procedures for announcing interruptions to the service…), performance requirements: (implementation Duration continuity: (availability to be recovered,…) required capacity for the service, response time from applications,…), and service desk (incident response time, problem response time,…). COBIT indicates that the conditions for service should be registered and subjected to a preliminary assessment by the service level manager, so that alternatives may be validated latter by the business unit strategic. The objective is to eliminate those services that cannot be aligned with key business objectives and keep only those who can be possibly validated by the strategic business unit. The ontological representation of the SLM Process: “identification of service requirements” domain knowledge is shown in Figure 3. Figure 3. The service level requirements management method' ontology
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5296 3.4. Agrements SIGN-OFF and service activation Process goal: Verify service acceptance and ensure that both the supplier and the customer sign off on service contracts. ITIL points out that once the service quality metrics are met, a contract between the service customer and the service provider is used as a basis for billing or cost allocation, and it helps explain what value customers are getting for their money. This procedure guarantees that all relevant operational compliance undertakings (OLAs) are authorised by their service operators, as well as that the receiver approves the strategic compliance agreement (SLA). The ontological representation of the SLM Process: "Agreements sign-off and service activation" domain awareness is depicted in Figure 4. Figure 4. Ontology for signing off on agreements and activating services 3.5. Service level monitoring and reporting Process Goal: To enhance service quality, track achieved service levels and compare them to agreed-upon service level goals. COBIT emphasizes the importance of appointing a service level manager who is responsible for monitoring and reporting on the achievement of the established service performance standards as well as any problems encountered during processing. The service level manager initiates a service inspection session in this process, with the goal of identifying the root cause of weak areas so that remedial action (root cause resolutions) can be taken, thus enhancing potential service quality. The service level manager can submit customer satisfaction surveys on a regular basis to find areas where work quality can be enhanced. A service level report is produced following the service level monitoring session and distributed to consumers and other relevant parties as a basis for service quality improvement measures. The ontological representation of the SLM Process: “Service Level Monitoring and Reporting” domain awareness is depicted in Figure 5. Figure 5. Service level monitoring and reporting process ontology
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5297 4. ARTEFACT EVALUATION 4.1. Ontology taxonomy evaluation ITSG ontology has been implemented in protégé software [26] to test the proposed ITSG artefact for inconsistency, incompleteness, and redundancy, and the credibility has been checked using the inference engines Fact++1.6.5 [27] and Pellet [28] incorporated as plug-ins in protégé software. Figure 6 shows the inferred classes that were created. Figure 6. ITSG ontology inferred classes 4.2. Domaine knowledge validation The goal of the suggested ontology was enabling an ITSG system which integrates COBIT and ITIL practices dedicated to service management. In order to validate our proposed alternative domain knowledge, it is mandatory to check if ITSG key performance indicators (KPIs) provided by COBIT can be calculated through the proposed ITSG system. Jena Fuseki Server 3.4.0 was used to demonstrate our ontology-based approach for this purpose. Jena Fuseki is a SPARQL server that uses the SPARQL protocol over HTTP to provide REST-style SPARQL HTTP updates, SPARQL queries, and SPARQL updates. The ontology data was populated using Protégé tools. This is then translated to XML/OWL format and submitted to Jena Fuseki Server to be sorted as a dataset. 5. RESULTS AND DISCUSSION In general, governance refers to an organization's ability to monitor and normalize its activities in order to prevent conflicts of interest among its various stakeholders. IT governance, in particular, refers to the methods for managing and regulating an organization's information system. According to Yamami et al. [29] “governance is the combination of steering and control, steering to ensure that today's decisions are preparing properly tomorrow, and control to measure the gap from what was planned.” In this paper, we are interested in IT service Governance models implementation in organizations. ITIL is the most used framework in organizations, according to Leoz et al. [30] organizations tend to implement ITIL for management purpose; they are limited to adopting the processes of incident response, issue resolution, process improvement and the function of service desk.
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5298 The service level agreement process is often neglected since it can put strain on IT departments. Yet, the SLA process is highly dependent to the other processes. We present through Figure 7 the relationship between the SLA process and the other processes of ITIL framework [29]. Figure 7. Relationship between ITIL processes Indeed, implementing ITSG processes t is not an easy job since its definition and role are not clear. This work aims to provide in this sense a comprehensive method for the control of ITSM components since the identification of service requirements phase up to the reporting of services. Even though there is an increasing amount of research dealing with ITSM, a complete ITSG ontology does not exist. As a result, creating a shared representation is needed of IT service control concepts and to show how these concepts relate to ITSM problems in information systems engineering. The aim is to provide a machine-readable text for the ITSG domain model, which will be added to the technical literature. Second, to the scientific literature concerned with enhancing IT governance systems through a better understanding of their architectures. Similarly, the ITSG ontology's main goal is to represent ITSG domain concepts, their properties, and relationships, to create a shared representation of ITSG concepts among researchers and practitioners, to demonstrate how these concepts relate to ITSM problems, to make ITSG knowledge reusable in similar information systems engineering situations, and to support the development of new ITSG modes. To meet these needs, the most widely used IT governance frameworks, COBIT and ITIL, have been integrated. COBIT practices are used for the audit and control perspective, while ITIL practices take the service management perspective. The objective is to distinguish control from management, as emphasized by COBIT V5. The ITSG ontology is formally developed according to the DSR approach. The proposed objects are designed using COBIT best practices (DS1: Define and manage service levels) and ITIL best practices (service level management). They were used to search for inconsistency, incompleteness, and redundancy in the safe applications. The inference engines Fact ++ and Pellet were used to verify the credibility. While COBIT defines a set of key performance indicators for the DS1 phase, it does not specify how these indicators should be reported. The Jena Fuseki server was used to manage the ITSG SPARQL queries in order to validate the proposed ontological domain information. It turns out that with the proposed ITSG alternative, the COBIT DS1 KPIs can be calculated efficiently as shown in Table 1. This leads to the belief that a combination of ITIL and COBIT processes can lead to a substantial change in service quality and improved Business-IT service alignment. By sharing ITSG knowledge, the expertise of ITG practices is used in the organization, and coordination between external providers and consumers is improved. The results are expected to contribute to the development of IT governance frameworks for use by non-specialized IT governance executives in companies, and to minimize the bureaucracy of IT executives. The proposed artifact may be a paradigm shift in how information management frameworks are integrated to meet the needs of organizations. By recognizing existing waste, ITIL and Lean IT practices can be combined to ensure that IT processes operate effectively, safely, and efficiently.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  From IT service management to IT service governance: an ontological approach for … (Lamia Moudoubah) 5299 Table 1. Explains the SPARQL queries that were used to calculate COBIT DS1 phase KPIs KPI 1 : Resolution of a service level update request with a time lag SELECT * WHERE { ?consumer o:initiates ?request. ?request o:requests ?SL. ?request o:request_date ?requestDate. ?request o:response_date ?responseDate. BIND (?responseDate - ?requestDate as ?resolutionTimeLag). ?request o:request_decision ?decision. FILTER (?decision ="resolved"). } KPI 2: Consumer satisfaction surveys are conducted on a regular basis. SELECT (COUNT(*) as ?surveyFrequency ) ?consumer WHERE { ?consumer o:repliesTo ?survey . ?survey o:survey_date ?s. BIND ( YEAR(?s) as ?year). BIND (xsd:string(?year) as ?y). FILTER ( ?y ="2017"). } GROUPBY ?consumer KPI 3: The amount of time it takes to fix a service level problem SELECT ?SL ?rootCauseAnalyses ?rootCauseResolution ?resolutionTimeLag WHERE { ?rootCauseAnalyses o:analyses ?SL. ?RCR o:resolves ?SL. ?rootCauseAnalyses o:RCA_date_begin ?RCADB. ?rootCauseResolution o:RCR_date ?RCRD. BIND ( ?RCRD - ?RCADB as ?resolutionTimeLag). } KPI4: Number of times that cause analysis of service level procedures and subsequent resolution is completed within required period SELECT ( COUNT(*) as ?numberOfcompletedRCA ) WHERE { ?rootCauseAnalyses o:analyses ?SL. ?rootCauseResolution o:resolves ?SL. ?rootCauseAnalyses o:RCA_expected_date_end ?RCAEDE. ?rootCauseResolution o:RCR_date ?RCRD. FILTER ( ?RCRD < ?RCAEDE). } KPI5: The importance of the additional funding required to meet the specified service level SELECT * WHERE { ?RootCauseResolution o:resolves ?SL. ?RootCauseResolution o:RCR_cost ?RootCauseResolutionCost. } 6. CONCLUSION The problem of applying IT best practices to determine the contribution of IT investments to business value has received increasing attention from practitioners and academics in recent decades. IT governance has emerged as a response to this issue. Organizations must adopt the structures and processes necessary to ensure that only services aligned with strategic business objectives are approved and prioritized. Adopting these processes, however, is difficult due to a lack of clarity in their meaning and function. This paper proposes an alternative to the ITSG system by presenting an ontology that has been formally constructed using the DSR approach and aims to formalize ITG knowledge. The aim was to clear up any misconceptions about the ITSG model implementation's intent. The ontology scheme was designed and evaluated using the Protégé program. SPARQL queries on the JENA FUSEKI server successfully validated the proposed ITSG domain ontology. The obtained results reveal that the proposed ontology enables effective control of IT services and may result in substantial progress in service quality and improved alignment of IT and business services.
  • 9.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 11, No. 6, December 2021 : 5292 - 5300 5300 REFERENCES [1] W. Hanchul, S.-J. Jeong, and J.-Ho Huh, "Improvement of ITSM it service efficiency in military electronic service," Journal of Information Processing Systems, vol. 16, no. 2, pp. 246-260, 2020, doi: 10.3745/JIPS.03.0134. [2] Z. Dong and Z. Chao, "Adoption of COBIT 5 and ITIL in Small and Medium Size Enterprises in China," Thesis, School of Engineering, Jönköping, 2014. [3] L. Aleš, H. Tomaž, and P. Andreja, "IT governance mechanisms and contingency factors: Towards an adaptive IT governance model," Organizacija, vol. 51, no. 4, pp. 286-310, 2018, doi: 10.2478/orga-2018-0024. [4] A. Hevner, R. Alan, S. T. March, T. Salvatore, and J. Park, "Design Science in Information Systems Research," MIS Quarterly, vol. 28, no. 1, pp. 75-105, 2004. [5] D. Ajantha and T. Bernhard, "Enriching Conceptual Modelling Practices through Design Science," International Conference on Exploring Modeling Methods for Systems Analysis and Design-BPMDS 2011, vol. 81, 2011, pp. 497-510. [6] S. Michael, B. Tilo and K. Helmut, "Explicating design theories with conceptual models: Towards a theoretical role of reference models," Wissenschaftstheorie und gestaltungsorientierte Wirtschaftsinformatik, Physica-Verlag HD, pp. 175-194, 2009, doi: 10.1007/978-3-7908-2336-3_9 [7] S. A. Herbert “The sciences of the artificial,” MIT press, 2019. [8] CIGREF, "IT frameworks," CIGREF, 2009. Accessed, 10 4 2016. [Online]. Available: http://www.cigref.fr/cigref_publications/RapportsContainer/Parus2009/Referentiels_de_la_DSI_CIGREF_2009.pdf [9] R. R. Ben, " The effects of the multiplicity of standards and repositories of good practice: the case of the Information Systems Department," (in France) Thèse de doctorat, Conservatoire national des arts et metiers- CNAM, 2015. [10] B. Barafort, A. -L. Mesquida, and A. Mas, "Integrating risk management in IT settings from ISO standards and management systems perspectives," Computer Standards & Interfaces, vol. 54, Part 3, pp. 176-185, 2017, doi: 10.1016/j.csi.2016.11.010. [11] M. Samiotakis, "Integrating ITIL and COBIT 5 to Optimize IT Process and Service Delivery," 6th itSMF South East Europe Conference, Athens, Greece, 2013. [12] A. Smirnov, A. Ponomarev, N. Shilov, A. Kashevnik, and N. Teslya, "Ontology-based human-computer cloud for decision support: architecture and applications in tourism," International Journal of Embedded and Real-Time Communication Systems (IJERTCS), vol. 9, no. 1, pp. 1-19, 2018, doi: 10.4018/IJERTCS.2018010101. [13] L. C.-Shing, J. Z.-Wei, and H. L.-Kai, "A fuzzy ontology and its application to news summarization," IEEE Transactions on Cybernetics, vol. 35, no 5, pp. 859-880, 2005, doi: 10.1109/TSMCB.2005.845032. [14] C. Office, “ITIL service strategy,” Norwich: the Stationery Office (TSO), 2011. [15] C. Office, “ITIL Service Design,” Norwich: the Stationery Office (TSO), 2011. [16] C. Office, “ITIL Service Transtion,” Norwich: the Stationery Office (TSO), 2011. [17] C. Office, “ITIL service Operation,” Norwich: the Stationery Office (TSO), 2011. [18] C. Office, “ITIL Continual service imprivement,” Norwich: the Stationery Office (TSO), 2011. [19] A. EL Yamami, "Representing IT Projects Risk Management Best," Engineering, Technology & Applied Science Research, vol. 7, no. 5, pp. 2062-2067, 2017, doi: 10.48084/etasr.1340. [20] L. X.-Wen, L. X.-Chun, and H. Ke-Jin, "Design and implementation of IT governance planning decision supporting system," CCDC'09: Proceedings of the 21st annual international conference on Chinese control and decision conference, 2009, pp. 5665-5668. [21] K. Joshi, Y. Yesha, and T. Finin, "Automating Cloud Services Lifecycle through Semantic technologies," IEEE Transactions on Services Computing, vol. 7, no. 1, pp. 109-122, 2013, doi: 10.1109/TSC.2012.41. [22] C.-Yu Lee, K. M. Kavi, R. A. Paul, and M. Gomathisankaran, "Ontology of Secure Service Level Agreement," IEEE 16th International Symposium on High Assurance Systems Engineering (HASE 2015), Daytona Beach, Florida, USA, 2015, pp. 166-172, doi: 10.1109/HASE.2015.33. [23] S. Conger, M. Winniford and L. Erickson-Harris, "Service management in operations," AMCIS 2008 Proceedings, Canada, p. 362, 2008. [24] M. A. Mark, “The protégé project: a look back and a look forward,” AI matters, vol. 1, no 4, p. 4-12, 2015, doi: 10.1145/2757001.2757003. [25] K. Building, "Fact ++," School of Computer Science University of Manchester, 2021. [Online]. Available: http://owl.man.ac.uk/factplusplus/. [26] Pellet, “Clark & Parsia, LLC,” 2021. [Online]. Available: http://pellet.owldl.com/ [27] A. Jena, "Jena Fuseki Server," Apache Software Foundation, 2021. [Online]. Available: https://jena.apache.org/documentation/fuseki2/index.html. [28] H.Österle et al., "Memorandum on Design-Oriented Information Systems Research," European Journal of Information Systems, vol. 20, pp. 7-10, 2011. [29] A. El Yamami, K. Mansouri, M. Qbadou, and El H. Illoussamen, “Multi-objective IT project selection model for improving SME strategy deployment,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no 2, pp. 1102-1011, 2018, doi: 10.11591/ijece.v8i2. [30] G. De Leoz and S. Petter, "Considering the social impacts of artefacts in information systems design science research," European Journal of Information Systems, vol. 27, no. 2, pp. 154-170, 2018, doi: 10.1080/0960085X.2018.1445462.