This paper is intended to cover the concept of IT Infrastructure Library (ITIL) v3 and how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help the corporate employees to do their work easily and its clients to feel the quality of services provided to them. ITIL is considered now as the de facto standard for IT Service Management (ITSM) in organizations which operate their business based on IT infrastructure and services. ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the total certified companies in the whole world and in Egypt no company has it until now as stated on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation methodology of ITIL in an Egyptian organization taking into consideration the cultural factors and how it will affect the success of this implementation. We have already implemented this methodology in three Egyptian companies and it succeeded to increase the level of process maturity from level one to level four according the PMF
It Service Management Implementation OverviewAlan McSweeney
This document describes an IT service management framework and implementation. It discusses ITIL/ITSM and the service management processes including incident and service request management. It provides an overview of the incident and service request management process including its principles, relationships between processes, and detailed processes. The document emphasizes that implementing service management requires understanding why it's being done, what resources are needed, and should be done in phases.
This document provides an overview of IT Service Management. It discusses definitions of service and service management. It introduces the IT Infrastructure Library (ITIL) framework, which is the most widely accepted approach for IT Service Management. ITIL provides best practices for IT Service Management. The document outlines the history and versions of ITIL, including ITIL v2 and v3. It also briefly mentions other related frameworks, such as COBIT and ISO/IEC 20000.
The document discusses IT service management (ITSM). It defines ITSM as a process-based approach to aligning IT services with organizational needs. ITSM is performed through people, processes, products, and partners. The document outlines some key benefits of ITSM, such as improved quality and productivity. It also discusses various ITSM frameworks and criteria for successful ITSM implementation, noting the importance of change management and business alignment.
This document provides an overview of IT service management (ITSM) and IT Infrastructure Library (ITIL) best practices. ITSM aims to align IT services with business needs, improve quality, and reduce costs. ITIL provides standard processes for IT service support, including incident management, problem management, change management, and configuration management. The document defines objectives and key performance indicators for evaluating these IT service management processes.
The how, why and what of ITIL® certificationsLora Beros
The ITIL® path is long and challenging, but you have to start somewhere. In this on-demand presentation, TrainSignal instructor Lowell Amos discusses the benefits of obtaining an ITIL® certification. Where do you start? Why should you bother? How can this certification transform your career? Let Lowell guide you through the first ladder of the ITIL® climb to success.
This document provides an overview of IT service management based on ITIL best practices. It defines key terms like service and service management. It explains that the primary objective of service management is to ensure IT services are aligned to business needs. It also discusses how to define services, the purpose of a service catalogue, and what customers want from services. The document outlines factors for determining service criticality and provides a sample of resolution and response times in service level agreements and operational level agreements. Critical success factors for an IT service catalogue and service level management are also highlighted.
The document summarizes IT service management at Hanover Technology Group. It discusses what service management is and the benefits it provides to HTG and its business partners. These benefits include increased customer satisfaction, financial savings, and improved decision making. The document also outlines HTG's 2011 goals and objectives for its service management initiative, which include implementing ITIL processes and the Service-Now automation platform to transform HTG's operations and deliver more business value. Training offerings are mentioned to educate staff on these new services and processes.
It Service Management Implementation OverviewAlan McSweeney
This document describes an IT service management framework and implementation. It discusses ITIL/ITSM and the service management processes including incident and service request management. It provides an overview of the incident and service request management process including its principles, relationships between processes, and detailed processes. The document emphasizes that implementing service management requires understanding why it's being done, what resources are needed, and should be done in phases.
This document provides an overview of IT Service Management. It discusses definitions of service and service management. It introduces the IT Infrastructure Library (ITIL) framework, which is the most widely accepted approach for IT Service Management. ITIL provides best practices for IT Service Management. The document outlines the history and versions of ITIL, including ITIL v2 and v3. It also briefly mentions other related frameworks, such as COBIT and ISO/IEC 20000.
The document discusses IT service management (ITSM). It defines ITSM as a process-based approach to aligning IT services with organizational needs. ITSM is performed through people, processes, products, and partners. The document outlines some key benefits of ITSM, such as improved quality and productivity. It also discusses various ITSM frameworks and criteria for successful ITSM implementation, noting the importance of change management and business alignment.
This document provides an overview of IT service management (ITSM) and IT Infrastructure Library (ITIL) best practices. ITSM aims to align IT services with business needs, improve quality, and reduce costs. ITIL provides standard processes for IT service support, including incident management, problem management, change management, and configuration management. The document defines objectives and key performance indicators for evaluating these IT service management processes.
The how, why and what of ITIL® certificationsLora Beros
The ITIL® path is long and challenging, but you have to start somewhere. In this on-demand presentation, TrainSignal instructor Lowell Amos discusses the benefits of obtaining an ITIL® certification. Where do you start? Why should you bother? How can this certification transform your career? Let Lowell guide you through the first ladder of the ITIL® climb to success.
This document provides an overview of IT service management based on ITIL best practices. It defines key terms like service and service management. It explains that the primary objective of service management is to ensure IT services are aligned to business needs. It also discusses how to define services, the purpose of a service catalogue, and what customers want from services. The document outlines factors for determining service criticality and provides a sample of resolution and response times in service level agreements and operational level agreements. Critical success factors for an IT service catalogue and service level management are also highlighted.
The document summarizes IT service management at Hanover Technology Group. It discusses what service management is and the benefits it provides to HTG and its business partners. These benefits include increased customer satisfaction, financial savings, and improved decision making. The document also outlines HTG's 2011 goals and objectives for its service management initiative, which include implementing ITIL processes and the Service-Now automation platform to transform HTG's operations and deliver more business value. Training offerings are mentioned to educate staff on these new services and processes.
This document provides an introduction and overview of ITIL (Information Technology Infrastructure Library). ITIL is a framework of best practices for IT service management and focuses on aligning IT services with business needs. The document outlines the history of ITIL and describes the key aspects of its service lifecycle approach including service strategy, design, transition, operation, and continual service improvement. It also discusses the service desk function and provides examples of processes within each lifecycle stage like service portfolio management and incident management. Benefits of adopting ITIL include improved business alignment, standardized processes, increased productivity and efficiency, and better customer satisfaction.
ITIL Foundation in IT Service Management Alkesh Mishra
The document provides an overview of ITIL (Information Technology Infrastructure Library), which is a framework for IT service management. It describes the key components of ITIL including the service lifecycle (service strategy, design, transition, operation, and continual service improvement), certification levels (foundation, intermediate, expert), and intermediate modules (lifecycle and capability). The purpose of ITIL is to help organizations align IT services with business needs, deliver value, and improve processes. Adopting ITIL best practices can benefit organizations through improved efficiency, quality, and reduced costs.
Documentation Framework for IT Service DeliverySimon Denton
I developed this for a project that I am currently involved in. The project aim is to develop a documentation framework for the provision of IT as a Service. I devised the framework using the Microsoft Operations Framework as ‘glue’ between other frameworks like ITIL. I thought I’d share it as it might be useful to others who are in a similar situation. The end result is a relatively compact set of documents for each service offered by IT.
The Service Catalog is not a Request Portal. The terms are often used interchangeably due to lack of knowledge, which can cause confusion for IT and IT's customers.
Over the past year, Evergreen conducted dozens of one-day Service Catalog workshops around the U.S. Attended by more than 500 people, a recurring theme we noted was that many attendees thought they had a Service Catalog, when in fact they actually had a Request Portal.
IT needs to increase its focus on 3 important areas:
Delivering services customers want and need
Better alignment with the needs of the business
Cost transparency to give visibility to the cost of services
Learn more and access the webinar recording at:
http://www.evergreensys.com/it-webinars-whitepapers-evergreen-systems
#servicecatalog #itsm #servicenow #itservicecatalog
How to build an integrated and actionable IT Service Catalogmboyle
This presentation provides a lower level of detail on how to build a n IT service catalog than provided by ITIL V3. It augments thinking in this area based on 25 years of building Service Catalogs
Integrated IT Service Management: From Strategy to Implementing to User AdoptionCA Technologies
Service Management is becoming increasingly pervasive as a key ingredient in the fabric of the business and IT. Explore how Service Management must integrate with all aspects of the IT environment, including project and infrastructure management, and take a close look at a real-life example at a major healthcare organization.
To learn more about Service Management solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
The document summarizes an ITSM implementation project at an organization with 120 employees. The project formalized the incident management process, created documentation, implemented an automated service desk and incident tracking system, and trained staff. As a result, incident response improved, responsibilities were clarified, and customer satisfaction with IT services increased. Next steps include continuing to improve processes and implement additional ITIL components to further enhance IT service management.
This document provides an overview of an ITIL Foundation training course. It includes sections on key concepts of service management, guiding principles, the four dimensions of service management, the ITIL service value system, service value chain activities, key terms of 18 ITIL practices, and an overview of 7 ITIL practices. The document also introduces the trainer and provides their qualifications.
The document describes an upcoming seminar on ITIL Foundation Certification. It will provide an overview of IT Service Management and ITIL, including the key concepts and areas of ITIL. Attendees will learn about the ITIL service lifecycle and why organizations implement ITIL. The seminar will also help prepare attendees for the ITIL Foundation Certification exam.
The document discusses key concepts in IT service management (ITSM) and ITIL. It covers the core ITSM components including service strategy, service design, service transition, service operation, and continual service improvement. Some key processes explained in ITIL include change management, problem management, and incident management. The benefits of adopting ITSM best practices like ITIL are also highlighted.
ITIL is a set of best practices for managing IT services, development, and operations consisting of a series of books. A service desk provides a single point of contact for users and IT to improve customer service and support incident management, problem management, request fulfillment, and access management processes. An effective service desk is structured and staffed appropriately with trained personnel to resolve incidents quickly and at a low cost while meeting customer satisfaction metrics.
This document introduces managed IT infrastructure services. It discusses threats to infrastructure like data corruption, component failure, and human error. It then outlines the benefits of managed services, including higher availability, efficient outsourcing, 24/7 monitoring, and leveraging best practices. Key aspects of the managed services solution are proactive monitoring, knowledge sharing, and certified staff.
GSS America\'s Workplace Services aim at equipping customer’s business with round-the-clock support, through its Global Operations Command Center (GOCC). Its comprehensive range of workplace services gives customers the ability to reduce their costs and improve their service levels. GSS intends to help global enterprises cut down on their infrastructure maintenance costs and provide access to expert skills.
The document provides an agenda for an ITIL4 and ServiceNow overview presentation. It includes introductions of the presenter, Mario Vivas. It then provides overviews of ITIL4, focusing on its practices and dimensions of service management. It discusses the ServiceNow platform and its key product lines and applications for incident management, problem management, change management, service catalog, knowledge management and demonstrations. The presentation aims to highlight ITIL4 guiding principles and how ServiceNow supports various ITSM processes and practices through its applications and integrations.
Defining Services for a Service CatalogAxios Systems
The document discusses designing and defining services for a service catalog. It outlines that a service catalog involves defining IT services and components, as well as business services, and mapping their relationships. It also discusses involving both IT and customers to understand key needs and priorities. The document provides guidance on how to structure services in a service catalog hierarchy and design the various elements and views needed, including user, business and technical views. It emphasizes the importance of strategy workshops to get input from stakeholders and ensure buy-in for a successful service catalog.
Historically, IT operations management (ITOM) teams have been focused on system health and up-time, while separately, IT service management (ITSM) teams manage and remediate end-user issues. The silos between these two functions have spurned challenges that can be overcome with improved integration, collaboration, and transparency across practices. ITSM and ITOM teams are working toward the same goals of up-time, accessibility and improved customer experience. So why can’t they integrate better for delivering on these objectives?
In this presentation, we explore:
The cause and business impact of silo'ed ITSM and ITOM practices
The benefits of improving integration, collaboration, and transparency across practices
Ways for you to exploit the inefficiencies and key metrics you can present the business in advocating for a better solution
And, we’ll introduce the solution of platform thinking, where silos are broken down between IT practices, and technology is operated and managed as a unified front with an open framework of adaptability.
Learn how to present a better solution for improving IT efficiencies, delivering improved customer experience, and enabling innovation throughout your organization, by bringing ITSM and ITOM practices together.
ITOM Platform features to look for if ITSM integration is important to your organization:
SERVICE HEALTH MANAGEMENT: Unified discovery and intelligence, Live asset Inventory, Unified service performance, Visual workflows in service maps
AIOPS MACHINE LEARNING: Intelligent event correlation, Noise suppression, Situational awareness, Incident Response
INTEGRATED TICKETING REQUESTS: Automated Escalations, Comprehensive Incident Collaboration
POLICY AUTOMATION SCRIPTS: Out of the box scripts, Customize scripts
SERVICE REMEDIATION: Enforce Process Governance, Automated Remediation Policies, Secure Infrastructure Access
Learn more at https://www.opsramp.com
Also, follow us on social media channels to learn about product highlights, news, announcements, events, conferences and more:
Twitter - https://www.twitter.com/OpsRamp
LinkedIn - https://www.linkedin.com/company/opsramp
Facebook - https://www.facebook.com/OpsRampHQ/
Service management
ITIL and the Service value system
ITIL Guiding principles
ITIL Service value chain
ITIL Four dimensions
ITIL Practices
ITIL Continual improvement
ITIL Certification scheme
What’s in it for me?
Itil Service Portfolio Management, The Service Catalog, And Yourajanam
This white paper discusses service portfolio management according to ITIL best practices. It describes implementing effective service lifecycle management through a service portfolio that includes a service catalog detailing all relevant information about each service. The service portfolio provides strategic insight into IT services and allows for efficient management of the service lifecycle from request to retirement. Maintaining a comprehensive service portfolio is important for running IT as a business and generating value for the organization.
This document provides an overview of eTOM (enhanced Telecom Operations Map) and ITIL (Information Technology Infrastructure Library) frameworks and how they can be combined. It introduces eTOM as a business process framework that represents the processes and functions of a telecommunications enterprise. ITIL is introduced as a collection of best practices for managing IT services. The document explains that eTOM and ITIL have complementary strengths and are mutually supportive, with eTOM providing a business-focused view of processes and ITIL providing IT-focused best practices to support business needs. It outlines how the two frameworks can be viewed as orthogonal and combined by mapping ITIL practices into specific eTOM processes.
ServiceNow ITOM (IT Operations Management) is a popular solution that addresses these challenges by providing comprehensive tools for managing IT operations.
This document provides an introduction and overview of ITIL (Information Technology Infrastructure Library). ITIL is a framework of best practices for IT service management and focuses on aligning IT services with business needs. The document outlines the history of ITIL and describes the key aspects of its service lifecycle approach including service strategy, design, transition, operation, and continual service improvement. It also discusses the service desk function and provides examples of processes within each lifecycle stage like service portfolio management and incident management. Benefits of adopting ITIL include improved business alignment, standardized processes, increased productivity and efficiency, and better customer satisfaction.
ITIL Foundation in IT Service Management Alkesh Mishra
The document provides an overview of ITIL (Information Technology Infrastructure Library), which is a framework for IT service management. It describes the key components of ITIL including the service lifecycle (service strategy, design, transition, operation, and continual service improvement), certification levels (foundation, intermediate, expert), and intermediate modules (lifecycle and capability). The purpose of ITIL is to help organizations align IT services with business needs, deliver value, and improve processes. Adopting ITIL best practices can benefit organizations through improved efficiency, quality, and reduced costs.
Documentation Framework for IT Service DeliverySimon Denton
I developed this for a project that I am currently involved in. The project aim is to develop a documentation framework for the provision of IT as a Service. I devised the framework using the Microsoft Operations Framework as ‘glue’ between other frameworks like ITIL. I thought I’d share it as it might be useful to others who are in a similar situation. The end result is a relatively compact set of documents for each service offered by IT.
The Service Catalog is not a Request Portal. The terms are often used interchangeably due to lack of knowledge, which can cause confusion for IT and IT's customers.
Over the past year, Evergreen conducted dozens of one-day Service Catalog workshops around the U.S. Attended by more than 500 people, a recurring theme we noted was that many attendees thought they had a Service Catalog, when in fact they actually had a Request Portal.
IT needs to increase its focus on 3 important areas:
Delivering services customers want and need
Better alignment with the needs of the business
Cost transparency to give visibility to the cost of services
Learn more and access the webinar recording at:
http://www.evergreensys.com/it-webinars-whitepapers-evergreen-systems
#servicecatalog #itsm #servicenow #itservicecatalog
How to build an integrated and actionable IT Service Catalogmboyle
This presentation provides a lower level of detail on how to build a n IT service catalog than provided by ITIL V3. It augments thinking in this area based on 25 years of building Service Catalogs
Integrated IT Service Management: From Strategy to Implementing to User AdoptionCA Technologies
Service Management is becoming increasingly pervasive as a key ingredient in the fabric of the business and IT. Explore how Service Management must integrate with all aspects of the IT environment, including project and infrastructure management, and take a close look at a real-life example at a major healthcare organization.
To learn more about Service Management solutions from CA Technologies, please visit: http://bit.ly/1wEnPhz
The document summarizes an ITSM implementation project at an organization with 120 employees. The project formalized the incident management process, created documentation, implemented an automated service desk and incident tracking system, and trained staff. As a result, incident response improved, responsibilities were clarified, and customer satisfaction with IT services increased. Next steps include continuing to improve processes and implement additional ITIL components to further enhance IT service management.
This document provides an overview of an ITIL Foundation training course. It includes sections on key concepts of service management, guiding principles, the four dimensions of service management, the ITIL service value system, service value chain activities, key terms of 18 ITIL practices, and an overview of 7 ITIL practices. The document also introduces the trainer and provides their qualifications.
The document describes an upcoming seminar on ITIL Foundation Certification. It will provide an overview of IT Service Management and ITIL, including the key concepts and areas of ITIL. Attendees will learn about the ITIL service lifecycle and why organizations implement ITIL. The seminar will also help prepare attendees for the ITIL Foundation Certification exam.
The document discusses key concepts in IT service management (ITSM) and ITIL. It covers the core ITSM components including service strategy, service design, service transition, service operation, and continual service improvement. Some key processes explained in ITIL include change management, problem management, and incident management. The benefits of adopting ITSM best practices like ITIL are also highlighted.
ITIL is a set of best practices for managing IT services, development, and operations consisting of a series of books. A service desk provides a single point of contact for users and IT to improve customer service and support incident management, problem management, request fulfillment, and access management processes. An effective service desk is structured and staffed appropriately with trained personnel to resolve incidents quickly and at a low cost while meeting customer satisfaction metrics.
This document introduces managed IT infrastructure services. It discusses threats to infrastructure like data corruption, component failure, and human error. It then outlines the benefits of managed services, including higher availability, efficient outsourcing, 24/7 monitoring, and leveraging best practices. Key aspects of the managed services solution are proactive monitoring, knowledge sharing, and certified staff.
GSS America\'s Workplace Services aim at equipping customer’s business with round-the-clock support, through its Global Operations Command Center (GOCC). Its comprehensive range of workplace services gives customers the ability to reduce their costs and improve their service levels. GSS intends to help global enterprises cut down on their infrastructure maintenance costs and provide access to expert skills.
The document provides an agenda for an ITIL4 and ServiceNow overview presentation. It includes introductions of the presenter, Mario Vivas. It then provides overviews of ITIL4, focusing on its practices and dimensions of service management. It discusses the ServiceNow platform and its key product lines and applications for incident management, problem management, change management, service catalog, knowledge management and demonstrations. The presentation aims to highlight ITIL4 guiding principles and how ServiceNow supports various ITSM processes and practices through its applications and integrations.
Defining Services for a Service CatalogAxios Systems
The document discusses designing and defining services for a service catalog. It outlines that a service catalog involves defining IT services and components, as well as business services, and mapping their relationships. It also discusses involving both IT and customers to understand key needs and priorities. The document provides guidance on how to structure services in a service catalog hierarchy and design the various elements and views needed, including user, business and technical views. It emphasizes the importance of strategy workshops to get input from stakeholders and ensure buy-in for a successful service catalog.
Historically, IT operations management (ITOM) teams have been focused on system health and up-time, while separately, IT service management (ITSM) teams manage and remediate end-user issues. The silos between these two functions have spurned challenges that can be overcome with improved integration, collaboration, and transparency across practices. ITSM and ITOM teams are working toward the same goals of up-time, accessibility and improved customer experience. So why can’t they integrate better for delivering on these objectives?
In this presentation, we explore:
The cause and business impact of silo'ed ITSM and ITOM practices
The benefits of improving integration, collaboration, and transparency across practices
Ways for you to exploit the inefficiencies and key metrics you can present the business in advocating for a better solution
And, we’ll introduce the solution of platform thinking, where silos are broken down between IT practices, and technology is operated and managed as a unified front with an open framework of adaptability.
Learn how to present a better solution for improving IT efficiencies, delivering improved customer experience, and enabling innovation throughout your organization, by bringing ITSM and ITOM practices together.
ITOM Platform features to look for if ITSM integration is important to your organization:
SERVICE HEALTH MANAGEMENT: Unified discovery and intelligence, Live asset Inventory, Unified service performance, Visual workflows in service maps
AIOPS MACHINE LEARNING: Intelligent event correlation, Noise suppression, Situational awareness, Incident Response
INTEGRATED TICKETING REQUESTS: Automated Escalations, Comprehensive Incident Collaboration
POLICY AUTOMATION SCRIPTS: Out of the box scripts, Customize scripts
SERVICE REMEDIATION: Enforce Process Governance, Automated Remediation Policies, Secure Infrastructure Access
Learn more at https://www.opsramp.com
Also, follow us on social media channels to learn about product highlights, news, announcements, events, conferences and more:
Twitter - https://www.twitter.com/OpsRamp
LinkedIn - https://www.linkedin.com/company/opsramp
Facebook - https://www.facebook.com/OpsRampHQ/
Service management
ITIL and the Service value system
ITIL Guiding principles
ITIL Service value chain
ITIL Four dimensions
ITIL Practices
ITIL Continual improvement
ITIL Certification scheme
What’s in it for me?
Itil Service Portfolio Management, The Service Catalog, And Yourajanam
This white paper discusses service portfolio management according to ITIL best practices. It describes implementing effective service lifecycle management through a service portfolio that includes a service catalog detailing all relevant information about each service. The service portfolio provides strategic insight into IT services and allows for efficient management of the service lifecycle from request to retirement. Maintaining a comprehensive service portfolio is important for running IT as a business and generating value for the organization.
Itil Service Portfolio Management, The Service Catalog, And You
Similar to Information Technology Service Management (ITSM) Implementation Methodology Based on Information Technology Infrastructure Library Ver.3 (ITIL V3)
This document provides an overview of eTOM (enhanced Telecom Operations Map) and ITIL (Information Technology Infrastructure Library) frameworks and how they can be combined. It introduces eTOM as a business process framework that represents the processes and functions of a telecommunications enterprise. ITIL is introduced as a collection of best practices for managing IT services. The document explains that eTOM and ITIL have complementary strengths and are mutually supportive, with eTOM providing a business-focused view of processes and ITIL providing IT-focused best practices to support business needs. It outlines how the two frameworks can be viewed as orthogonal and combined by mapping ITIL practices into specific eTOM processes.
ServiceNow ITOM (IT Operations Management) is a popular solution that addresses these challenges by providing comprehensive tools for managing IT operations.
This document provides an overview of ITIL (Information Technology Infrastructure Library), including its origins, core concepts, benefits, and widespread adoption. ITIL is a framework for IT service management that was developed in the 1980s by the UK government to promote best practices. It consists of five core publications that cover the service lifecycle from strategy to continual improvement. Implementing ITIL's standardized processes can help organizations improve efficiency, alignment with business needs, service quality, and gain a common language for discussing IT services. Thousands of large companies across various industries have adopted ITIL in whole or in part.
Class,Im providing a recently example of a critical analysis wr.docxclarebernice
Class,
I'm providing a recently example of a critical analysis written by Dr. Valorie King. This example is based on the 1st case study for this class, CSIA 350.
I think most of you have a good idea of what's required for the case studies, but use the information as you need. I will continue to grade appropriate.
A Critical Analysis (CA) is a discussion response that has an introductory paragraph, an analysis section (around 3 paragraphs or so), and a brief summary. For Case Study #1, a really good CA would have looked something like this:
There are many reasons why a business should invest in cybersecurity products and services. In [her / his] essay, [student name] addressed ethical principles which drive such investments. While ethics are important, the business needs and requirements for IT security must also be considered. In this critical analysis response, I would like to take a deeper look at three important points which drive businesses to invest in IT security.
First, consider the question of the Business Benefits of IT Security products and services. Businesses exist to make a profit (Vitez, 2016). Making a profit requires that losses and unnecessary costs be avoided. This is where the business benefit of IT security products comes into play. An anti-virus product can prevent a malware infection (Drew, 2011). Spending some money to buy an anti-virus product to prevent malware will save money in the long run since the business will not have to pay to cleanup malware infections on laptops, workstations, and servers.
Second, consider the question of Why an organization should invest in IT security technologies. This is very similar to the first question. But, in addition to the financial benefits (cost avoidance) there are also legal and regulatory reasons why an organization should invest in IT security technologies (Smedinghoff, 2005). Many laws require that companies use encryption to protect private information (HIPAA, FERPA, etc.). This is an IT security technology that a company may be legally required to purchase (invest in).
Third, consider Where an organization should focus its attention & why. Technology is only one type of investment that a company should make when it comes to IT security. Investing in people by hiring well qualified security professionals and then providing ongoing training is another area where a company needs to spend money to protect information, information systems, and information infrastructures (ISACA, 2009). Even the best IT security products need people who understand how to configure, test, and operate those products. For this reason, an organization should also focus its attention on hiring the best security professionals that it can afford. Then, the company should keep these people the best by investing in training.
In summary, there are many reasons why a business should invest in IT security and why those investments should include both people and products (technologies). But, the b ...
An ITSM consultant helps organizations transition to a process-driven IT service management lifecycle model. The consultant assesses the organization's ITSM maturity and customer needs. They help develop a sourcing model to determine what services should be in-house or outsourced. The consultant also aids in developing repeatable ITSM processes, training staff, evaluating technology to support the ITSM model, and conducting audits to assess compliance. By taking a holistic "lifecycle within a lifecycle" approach, the consultant guides the organization throughout its ITSM implementation and optimization.
This document discusses the implementation of IT Service Management (ITSM) at Illinois State University. It notes that many IT teams are interested in ITIL certifications and maturing their processes. The current ITSM tools are nearing end of life and not meeting all needs. The university is moving to a common ITSM process and tool (Cherwell) to provide consistency, transparency, complex reporting, and an intuitive, linked system. Implementing ITSM will help track and prioritize work to control chaos. It will also make IT more efficient and increase response time for customers. Measuring performance with data will help align with university goals and meet customer expectations. An implementation timeline is provided.
This document discusses automation in IT service management and its impact on the IT industry. It begins by reviewing IT service management (ITSM) and the IT Infrastructure Library (ITIL) framework. It then analyzes the scope for automating each of the ITIL processes across five lifecycle phases: service strategy, service design, service transition, service operation, and continual service improvement. The analysis finds that service operation processes have the highest automation potential of 75-85%, while service strategy processes have the lowest at 10-15%. The document argues that automation can help IT organizations reduce costs and improve service delivery through the ITSM lifecycle.
This document discusses automation in IT service management and its impact on the IT industry. It begins by reviewing IT service management (ITSM) and the Information Technology Infrastructure Library (ITIL) framework. It then analyzes the scope for automating each of the ITIL processes across five life cycle phases: service strategy, service design, service transition, service operation, and continual service improvement. The analysis finds that service operation processes have the highest automation potential of 75-85%, while service strategy processes have the lowest at 10-15%. The document also discusses the opportunities and challenges that widespread ITSM automation could create for IT companies.
ITIL (Information Technology Infrastructure Library) is a framework for IT service management that was developed in the 1980s in the UK. It provides best practices for IT service delivery, operations, and support to businesses. Adopting ITIL helps organizations improve efficiency, align IT with business needs, deliver predictable services through consistent processes, and continuously measure and improve services and processes. Many large companies worldwide use ITIL framework to manage their IT operations and services.
E governance project management practices through information technology infr...IJARIIT
E-Governance implementation requires certain service levels to be achieved as they replace traditional manual
processes thereby increasing the dependence of government agencies on information technology based services. High quality
services entail high performance, availability, and scalability among other service characteristics. Strict measures are required
to help e-governments evaluate the service level and assess the quality of the service. In this paper, we introduce the IT
Infrastructure Library (ITIL) framework - a set of best practices to achieve quality service and overcome difficulties associated
with the growth of IT systems and discuss its significance and benefits in E-Governance implementation.
ITIL (Information Technology Infrastructure Library) is a framework for managing IT services that focuses on aligning IT services with business needs. ITIL defines best practices for IT service management (ITSM) through a lifecycle approach. The ITIL service lifecycle includes five stages: service strategy, service design, service transition, service operation, and continual service improvement. The goal is to design, deliver, and manage IT services that create business value for customers.
The implementation of IT governance is important to lead and evolve the information system in agreement with stakeholders. This requirement is seriously amplified at the time of digital area considering all the new technologies that has been lunched recently (Big DATA, Artificial Intelligence, Machine Learning, Deep learning...). Thus, without a good rudder, every company risks getting lost in a sea endless and unreachable goals.
This paper aims to provide decision-making system that allow professionals to choose IT governance framework suitable to desired criteria and their importance based on a multi-criteria analysis method (WSM), we did implement a case study based on our analysis in a Moroccan company. Moreover, we present better understanding of IT Governance aspects such as standards and best practices.
Our article goes into a global objective that aims to build an integrated generated meta-model for better approach of IT Governance.
Paper Practical Itsm Transformation Qai V 1.0Sukumar Daniel
The document summarizes Tesco's ITSM transformation initiative to improve its IT service management. It implemented an ITSM framework using ITIL best practices to align IT services with business needs. The initiative involved rolling out an e-service desk and developing tools for transparency. It analyzed incident data over multiple iterations to identify top issues, improve classifications and reduce first time fixes. A 100 day plan was created to establish transparency, improve processes, identify issues, implement changes and build sustainability through knowledge sharing and metrics.
empirical study on the status of moroccan information systems and proposition...INFOGAIN PUBLICATION
Today, the function of the chief information officer (CIO) has become part of the flow charts of many Moroccan companies [1]. Based on this statement, we did an empirical study in the first part of this work on the state of information systems (IS) Moroccan to know their strengths and weaknesses. The aim of the second part is to propose an approach based on the IT (information technology) frameworks helping CIOs to form their own repository of good practices to be applied in order to have good IT governance.
Multimodal IT and Orchestration for Digital TransformationLeon Dohmen
Digital transformation implies changing business models. To be able to adapt organizations are using IT operating models and working methods that work at different speeds causing alignment issues between models and working methods. Consequences are (too) high support and maintenance cost, slow innovation, and inconsistent customer experience. The use of archetypes for IT operating models provides a handle to arrange adequate orchestration between operating models and working methods.
This document discusses the impact of data mining on business intelligence. It begins by defining business intelligence as using new technologies to quickly respond to changes in the business environment. Data mining is an important part of the business intelligence lifecycle, which includes determining requirements, collecting and analyzing data, generating reports, and measuring performance. Data mining allows businesses to access real-time, accurate data from multiple sources to improve decision making. Using business intelligence and data mining techniques can help businesses become more efficient and make better decisions to increase profits and customer satisfaction. The expected results of applying business intelligence include improved decision making through accurate, timely information to support organizational goals and strategic plans.
Trough External Service Management Improve Quality & ProductivityIJMER
Abstract: The challenges in Small car project, necessitated improvements in quality and productivity,
right from day one of implementation of project. Detailed studies on external management services,
manufacturing process, various departments involved, and procedures followed were done, and
problems in the existing system were identified and solutions were provided. The object of this paper is to
investigate methods of measuring performance. The subject of this paper is the process of implementing
methods to increase productivity. Methods (procedures) of the study. Pattern during the writing of this
work was used by scientist’s articles information about the measurement and implementation of systems
productivity. Since this work was written with the use of different methods and examples, not all of them
before writing the work were known to me, I want to present a certain part to improve the productivity of
some companies in my country.
Toyota's production system is focused on continuous improvement, eliminating waste, and respecting people. The system uses "jidoka" whereby machines stop immediately if problems are detected to prevent defects. It also uses "just-in-time" production where each process only produces what is needed by the next to minimize waste. The system aims for smooth and efficient workflow through standardized processes and visual management.
Similar to Information Technology Service Management (ITSM) Implementation Methodology Based on Information Technology Infrastructure Library Ver.3 (ITIL V3) (20)
The Use of Java Swing’s Components to Develop a WidgetWaqas Tariq
Widget is a kind of application provides a single service such as a map, news feed, simple clock, battery-life indicators, etc. This kind of interactive software object has been developed to facilitate user interface (UI) design. A user interface (UI) function may be implemented using different widgets with the same function. In this article, we present the widget as a platform that is generally used in various applications, such as in desktop, web browser, and mobile phone. We also describe a visual menu of Java Swing’s components that will be used to establish widget. It will assume that we have successfully compiled and run a program that uses Swing components.
3D Human Hand Posture Reconstruction Using a Single 2D ImageWaqas Tariq
Passive sensing of the 3D geometric posture of the human hand has been studied extensively over the past decade. However, these research efforts have been hampered by the computational complexity caused by inverse kinematics and 3D reconstruction. In this paper, our objective focuses on 3D hand posture estimation based on a single 2D image with aim of robotic applications. We introduce the human hand model with 27 degrees of freedom (DOFs) and analyze some of its constraints to reduce the DOFs without any significant degradation of performance. A novel algorithm to estimate the 3D hand posture from eight 2D projected feature points is proposed. Experimental results using real images confirm that our algorithm gives good estimates of the 3D hand pose. Keywords: 3D hand posture estimation; Model-based approach; Gesture recognition; human- computer interface; machine vision.
Camera as Mouse and Keyboard for Handicap Person with Troubleshooting Ability...Waqas Tariq
Camera mouse has been widely used for handicap person to interact with computer. The utmost important of the use of camera mouse is must be able to replace all roles of typical mouse and keyboard. It must be able to provide all mouse click events and keyboard functions (include all shortcut keys) when it is used by handicap person. Also, the use of camera mouse must allow users troubleshooting by themselves. Moreover, it must be able to eliminate neck fatigue effect when it is used during long period. In this paper, we propose camera mouse system with timer as left click event and blinking as right click event. Also, we modify original screen keyboard layout by add two additional buttons (button “drag/ drop” is used to do drag and drop of mouse events and another button is used to call task manager (for troubleshooting)) and change behavior of CTRL, ALT, SHIFT, and CAPS LOCK keys in order to provide shortcut keys of keyboard. Also, we develop recovery method which allows users go from camera and then come back again in order to eliminate neck fatigue effect. The experiments which involve several users have been done in our laboratory. The results show that the use of our camera mouse able to allow users do typing, left and right click events, drag and drop events, and troubleshooting without hand. By implement this system, handicap person can use computer more comfortable and reduce the dryness of eyes.
A Proposed Web Accessibility Framework for the Arab DisabledWaqas Tariq
The Web is providing unprecedented access to information and interaction for people with disabilities. This paper presents a Web accessibility framework which offers the ease of the Web accessing for the disabled Arab users and facilitates their lifelong learning as well. The proposed framework system provides the disabled Arab user with an easy means of access using their mother language so they don’t have to overcome the barrier of learning the target-spoken language. This framework is based on analyzing the web page meta-language, extracting its content and reformulating it in a suitable format for the disabled users. The basic objective of this framework is supporting the equal rights of the Arab disabled people for their access to the education and training with non disabled people. Key Words : Arabic Moon code, Arabic Sign Language, Deaf, Deaf-blind, E-learning Interactivity, Moon code, Web accessibility , Web framework , Web System, WWW.
Real Time Blinking Detection Based on Gabor FilterWaqas Tariq
The document proposes a new method for real-time blinking detection based on Gabor filters. It begins by reviewing existing methods and their limitations in dealing with noise, variations in eye shape, and blinking speed. The proposed method uses a Gabor filter to extract the top and bottom arcs of the eye from an image. It then measures the distance between these arcs and compares it to a threshold: a distance below the threshold indicates a closed eye, while a distance above indicates an open eye. The document claims this Gabor filter-based approach is robust to noise, variations in eye shape and blinking speed. It presents experimental results showing the method can accurately detect blinking across different users.
Computer Input with Human Eyes-Only Using Two Purkinje Images Which Works in ...Waqas Tariq
A method for computer input with human eyes-only using two Purkinje images which works in a real time basis without calibration is proposed. Experimental results shows that cornea curvature can be estimated by using two light sources derived Purkinje images so that no calibration for reducing person-to-person difference of cornea curvature. It is found that the proposed system allows usersf movements of 30 degrees in roll direction and 15 degrees in pitch direction utilizing detected face attitude which is derived from the face plane consisting three feature points on the face, two eyes and nose or mouth. Also it is found that the proposed system does work in a real time basis.
Toward a More Robust Usability concept with Perceived Enjoyment in the contex...Waqas Tariq
Mobile multimedia service is relatively new but has quickly dominated people¡¯s lives, especially among young people. To explain this popularity, this study applies and modifies the Technology Acceptance Model (TAM) to propose a research model and conduct an empirical study. The goal of study is to examine the role of Perceived Enjoyment (PE) and what determinants can contribute to PE in the context of using mobile multimedia service. The result indicates that PE is influencing on Perceived Usefulness (PU) and Perceived Ease of Use (PEOU) and directly Behavior Intention (BI). Aesthetics and flow are key determinants to explain Perceived Enjoyment (PE) in mobile multimedia usage.
Collaborative Learning of Organisational KnolwedgeWaqas Tariq
This paper presents recent research into methods used in Australian Indigenous Knowledge sharing and looks at how these can support the creation of suitable collaborative envi- ronments for timely organisational learning. The protocols and practices as used today and in the past by Indigenous communities are presented and discussed in relation to their relevance to a personalised system of knowledge sharing in modern organisational cultures. This research focuses on user models, knowledge acquisition and integration of data for constructivist learning in a networked repository of or- ganisational knowledge. The data collected in the repository is searched to provide collections of up-to-date and relevant material for training in a work environment. The aim is to improve knowledge collection and sharing in a team envi- ronment. This knowledge can then be collated into a story or workflow that represents the present knowledge in the organisation.
Our research aims to propose a global approach for specification, design and verification of context awareness Human Computer Interface (HCI). This is a Model Based Design approach (MBD). This methodology describes the ubiquitous environment by ontologies. OWL is the standard used for this purpose. The specification and modeling of Human-Computer Interaction are based on Petri nets (PN). This raises the question of representation of Petri nets with XML. We use for this purpose, the standard of modeling PNML. In this paper, we propose an extension of this standard for specification, generation and verification of HCI. This extension is a methodological approach for the construction of PNML with Petri nets. The design principle uses the concept of composition of elementary structures of Petri nets as PNML Modular. The objective is to obtain a valid interface through verification of properties of elementary Petri nets represented with PNML.
Development of Sign Signal Translation System Based on Altera’s FPGA DE2 BoardWaqas Tariq
The main aim of this paper is to build a system that is capable of detecting and recognizing the hand gesture in an image captured by using a camera. The system is built based on Altera’s FPGA DE2 board, which contains a Nios II soft core processor. Image processing techniques and a simple but effective algorithm are implemented to achieve this purpose. Image processing techniques are used to smooth the image in order to ease the subsequent processes in translating the hand sign signal. The algorithm is built for translating the numerical hand sign signal and the result are displayed on the seven segment display. Altera’s Quartus II, SOPC Builder and Nios II EDS software are used to construct the system. By using SOPC Builder, the related components on the DE2 board can be interconnected easily and orderly compared to traditional method that requires lengthy source code and time consuming. Quartus II is used to compile and download the design to the DE2 board. Then, under Nios II EDS, C programming language is used to code the hand sign translation algorithm. Being able to recognize the hand sign signal from images can helps human in controlling a robot and other applications which require only a simple set of instructions provided a CMOS sensor is included in the system.
An overview on Advanced Research Works on Brain-Computer InterfaceWaqas Tariq
A brain–computer interface (BCI) is a proficient result in the research field of human- computer synergy, where direct articulation between brain and an external device occurs resulting in augmenting, assisting and repairing human cognitive. Advanced works like generating brain-computer interface switch technologies for intermittent (or asynchronous) control in natural environments or developing brain-computer interface by Fuzzy logic Systems or by implementing wavelet theory to drive its efficacies are still going on and some useful results has also been found out. The requirements to develop this brain machine interface is also growing day by day i.e. like neuropsychological rehabilitation, emotion control, etc. An overview on the control theory and some advanced works on the field of brain machine interface are shown in this paper.
Exploring the Relationship Between Mobile Phone and Senior Citizens: A Malays...Waqas Tariq
There is growing ageing phenomena with the rise of ageing population throughout the world. According to the World Health Organization (2002), the growing ageing population indicates 694 million, or 223% is expected for people aged 60 and over, since 1970 and 2025.The growth is especially significant in some advanced countries such as North America, Japan, Italy, Germany, United Kingdom and so forth. This growing older adult population has significantly impact the social-culture, lifestyle, healthcare system, economy, infrastructure and government policy of a nation. However, there are limited research studies on the perception and usage of a mobile phone and its service for senior citizens in a developing nation like Malaysia. This paper explores the relationship between mobile phones and senior citizens in Malaysia from the perspective of a developing country. We conducted an exploratory study using contextual interviews with 5 senior citizens of how they perceive their mobile phones. This paper reveals 4 interesting themes from this preliminary study, in addition to the findings of the desirable mobile requirements for local senior citizens with respect of health, safety and communication purposes. The findings of this study bring interesting insight to local telecommunication industries as a whole, and will also serve as groundwork for more in-depth study in the future.
Principles of Good Screen Design in WebsitesWaqas Tariq
Visual techniques for proper arrangement of the elements on the user screen have helped the designers to make the screen look good and attractive. Several visual techniques emphasize the arrangement and ordering of the screen elements based on particular criteria for best appearance of the screen. This paper investigates few significant visual techniques in various web user interfaces and showcases the results for better understanding and their presence.
This document discusses the progress of virtual teams in Albania. It provides context on virtual teams and how they differ from traditional teams in their reliance on technology for communication across distances. The document then examines the use of virtual teams in Albania, noting the growing infrastructure and technology usage that enables virtual collaboration. It highlights some virtual team examples in Albanian government and academic projects.
Cognitive Approach Towards the Maintenance of Web-Sites Through Quality Evalu...Waqas Tariq
It is a well established fact that the Web-Applications require frequent maintenance because of cutting– edge business competitions. The authors have worked on quality evaluation of web-site of Indian ecommerce domain. As a result of that work they have made a quality-wise ranking of these sites. According to their work and also the survey done by various other groups Futurebazaar web-site is considered to be one of the best Indian e-shopping sites. In this research paper the authors are assessing the maintenance of the same site by incorporating the problems incurred during this evaluation. This exercise gives a real world maintainability problem of web-sites. This work will give a clear picture of all the quality metrics which are directly or indirectly related with the maintainability of the web-site.
USEFul: A Framework to Mainstream Web Site Usability through Automated Evalua...Waqas Tariq
A paradox has been observed whereby web site usability is proven to be an essential element in a web site, yet at the same time there exist an abundance of web pages with poor usability. This discrepancy is the result of limitations that are currently preventing web developers in the commercial sector from producing usable web sites. In this paper we propose a framework whose objective is to alleviate this problem by automating certain aspects of the usability evaluation process. Mainstreaming comes as a result of automation, therefore enabling a non-expert in the field of usability to conduct the evaluation. This results in reducing the costs associated with such evaluation. Additionally, the framework allows the flexibility of adding, modifying or deleting guidelines without altering the code that references them since the guidelines and the code are two separate components. A comparison of the evaluation results carried out using the framework against published evaluations of web sites carried out by web site usability professionals reveals that the framework is able to automatically identify the majority of usability violations. Due to the consistency with which it evaluates, it identified additional guideline-related violations that were not identified by the human evaluators.
Robot Arm Utilized Having Meal Support System Based on Computer Input by Huma...Waqas Tariq
A robot arm utilized having meal support system based on computer input by human eyes only is proposed. The proposed system is developed for handicap/disabled persons as well as elderly persons and tested with able persons with several shapes and size of eyes under a variety of illumination conditions. The test results with normal persons show the proposed system does work well for selection of the desired foods and for retrieve the foods as appropriate as usersf requirements. It is found that the proposed system is 21% much faster than the manually controlled robotics.
Dynamic Construction of Telugu Speech Corpus for Voice Enabled Text EditorWaqas Tariq
In recent decades speech interactive systems have gained increasing importance. Performance of an ASR system mainly depends on the availability of large corpus of speech. The conventional method of building a large vocabulary speech recognizer for any language uses a top-down approach to speech. This approach requires large speech corpus with sentence or phoneme level transcription of the speech utterances. The transcriptions must also include different speech order so that the recognizer can build models for all the sounds present. But, for Telugu language, because of its complex nature, a very large, well annotated speech database is very difficult to build. It is very difficult, if not impossible, to cover all the words of any Indian language, where each word may have thousands and millions of word forms. A significant part of grammar that is handled by syntax in English (and other similar languages) is handled within morphology in Telugu. Phrases including several words (that is, tokens) in English would be mapped on to a single word in Telugu.Telugu language is phonetic in nature in addition to rich in morphology. That is why the speech technology developed for English cannot be applied to Telugu language. This paper highlights the work carried out in an attempt to build a voice enabled text editor with capability of automatic term suggestion. Main claim of the paper is the recognition enhancement process developed by us for suitability of highly inflecting, rich morphological languages. This method results in increased speech recognition accuracy with very much reduction in corpus size. It also adapts Telugu words to the database dynamically, resulting in growth of the corpus.
An Improved Approach for Word Ambiguity RemovalWaqas Tariq
Word ambiguity removal is a task of removing ambiguity from a word, i.e. correct sense of word is identified from ambiguous sentences. This paper describes a model that uses Part of Speech tagger and three categories for word sense disambiguation (WSD). Human Computer Interaction is very needful to improve interactions between users and computers. For this, the Supervised and Unsupervised methods are combined. The WSD algorithm is used to find the efficient and accurate sense of a word based on domain information. The accuracy of this work is evaluated with the aim of finding best suitable domain of word. Keywords: Human Computer Interaction, Supervised Training, Unsupervised Learning, Word Ambiguity, Word sense disambiguation
Parameters Optimization for Improving ASR Performance in Adverse Real World N...Waqas Tariq
From the existing research it has been observed that many techniques and methodologies are available for performing every step of Automatic Speech Recognition (ASR) system, but the performance (Minimization of Word Error Recognition-WER and Maximization of Word Accuracy Rate- WAR) of the methodology is not dependent on the only technique applied in that method. The research work indicates that, performance mainly depends on the category of the noise, the level of the noise and the variable size of the window, frame, frame overlap etc is considered in the existing methods. The main aim of the work presented in this paper is to use variable size of parameters like window size, frame size and frame overlap percentage to observe the performance of algorithms for various categories of noise with different levels and also train the system for all size of parameters and category of real world noisy environment to improve the performance of the speech recognition system. This paper presents the results of Signal-to-Noise Ratio (SNR) and Accuracy test by applying variable size of parameters. It is observed that, it is really very hard to evaluate test results and decide parameter size for ASR performance improvement for its resultant optimization. Hence, this study further suggests the feasible and optimum parameter size using Fuzzy Inference System (FIS) for enhancing resultant accuracy in adverse real world noisy environmental conditions. This work will be helpful to give discriminative training of ubiquitous ASR system for better Human Computer Interaction (HCI). Keywords: ASR Performance, ASR Parameters Optimization, Multi-Environmental Training, Fuzzy Inference System for ASR, ubiquitous ASR system, Human Computer Interaction (HCI)
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
B. Ed Syllabus for babasaheb ambedkar education university.pdf
Information Technology Service Management (ITSM) Implementation Methodology Based on Information Technology Infrastructure Library Ver.3 (ITIL V3)
1. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 113
Information Technology Service Management (ITSM)
Implementation Methodology Based on Information Technology
Infrastructure Library Ver.3 (ITIL V3)
Mostafa Mohamed AlShamy malshamy@egybyte.net
Faculty/Department/Division
Arab Academy for Science, Technology and Maritime Transport
Cairo, 2033 Alhoria, Egypt
Essam Elfakharany essam.elfakharany@aast.edu
Faculty/Department/Division
Arab Academy for Science, Technology and Maritime Transport
Cairo, 2033 Alhoria, Egypt
Mostafa Abd ElAziem melbakary@aast.edu
Faculty/Department/Division
Arab Academy for Science, Technology and Maritime Transport
Cairo, 2033 Alhoria, Egypt
Abstract
This paper is intended to cover the concept of IT Infrastructure Library Version 3 (ITIL) v3 and
how to implement it in order to increase the efficiency of any Egyptian IT corporate and to help
the corporate employees to do their work easily and its clients to feel the quality of services
provided to them. ITIL is considered now as the de facto standard framework for IT Service
Management (ITSM) in organizations which operate their business which is based on IT
infrastructure and services.
ITIL v3 was implemented in western organizations but still it is a new framework for the Egyptian
and Arabian environment. The best proof of the lack of ITSM in the Arab region and not Egypt
alone is that the percentage of the companies which have ISO/IEC 20000 are less than 2% of the
total certified companies in the whole world and in Egypt no company has it until now as stated
on APMG ISO/IEC 20000 website[1]. Accordingly this paper investigates an implementation
methodology of ITIL in Egyptian corporate taking into consideration the cultural factors and how it
will affect the success of this implementation. We have already implemented this methodology in
three Egyptian companies and it succeeded to increase the level of process maturity from level
one to level four according the ITIL Process Maturity Framework (PMF) [2]
This paper will include an introduction about the problem Egyptian corporates are facing now, a brief
introduction to ITIL V3 with its processes and lifecycle stage, related work, the implementation
methodology, the results achieved, conclusion and the future work.
Keywords: ITIL V3, ITSM, PMF, ISO/IEC 20000 and Service Management.
1. INTRODUCTION TO ITSM NEEDS IN THE EGYPTIAN MARKET
It is clear nowadays that the size of any corporate that uses IT to handle their day to day business is
increasing in a very fast way. These corporate are depending more and more every day on IT services
and computing processing, that is why they must consider building and implementing a clear ITSM and
its processes which can control all the IT services better. But when we look around us in almost every
corporate now we can find them have more than one team of professional engineers who try to do
their best in solving the day to day discovered problems and building new services and solutions too
without any governing body like a formal written policy which defines roles and responsibilities of each
one.
2. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 114
After some time the life of these teams will be very tough as they will turn to be fire fighters all the time,
because the environment is increasing in size and complexity and it is changing every minute due to
many updates, hot fixes and changing business needs too. The problem will increase if the corporate
is a big corporate with different customers at different locations with different needs and needed
customizations. The problems these teams face every now and then are due to:
1- Having no system maintaining and optimizing incident and problem management.
2- Having no system maintaining and optimizing change management.
3- Having no ability to design new services as they losing all their time in firefighting current
incidents and problems and failed change implementations.
4- Working a lot of time every day and even having shifts in the weekends.
5- Losing their customers’ satisfaction and loyalty.
6- Doing rework all the time as there is no documentation and knowledge transfer techniques.
7- Losing control over Service Availability, Continuity, Maintainability and Security because of
current, remaining and reopened incidents and problems and failed change implementations.
8- Spending more money on Service without any increase in the Service output.
This is why the big companies need ITSM more than small ones and this does not mean that small
companies do not need ITSM. It is clear that all companies need ITSM and it depends on the company
size and management methodology in deciding to what extent it will need help from ITSM.
2. INTRODUCTION ITIL V3
ITIL V3 is now considered the best public framework for IT Service Management and it includes
best practices for any IT service in any company whether this company is an internal IT
department which provides services to internal employees and departments as depicted below in
figure 1, a Shared Service Unit (SSU) which is an IT department in a group of companies and it
delivers services to all the employees in the companies of this group as depicted below in figure 2
or an external service provider which serves other companies in the market as depicted below in
figures 3:
FIGURE 1: Internal Service Provider [3]
3. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 115
FIGURE 2: Share Service Unit Provider [4]
FIGURE 3: External Service Provider [5]
ITIL defines a service as “A means of delivering value to customers by facilitating outcomes
customers want to achieve without the ownership of specific costs and risks.” [6] which clarifies to
every service provider the real meaning of service which is a value delivered to the customer to
increase the capability of achieving goals with the companied risks and costs. ITIL V3 also
divided any IT service lifecycle to five stages as shown in figure 4 and they are:
Service Strategy which defines the customer needs and the ability of the service provider
to decide whether to invest in these needs and whether they will be beneficial or not
Service Design which designs the services with all its aspects like technical architecture,
management systems, measurement systems and processes
Service Transition which builds, tests and delivers the new and changed services
Service Operation which run and maintain the services the customers use to reach to
their business goals
Continual Service Improvement which deals with the service throughout its lifecycle to
ensure continual improvement to sustain the value of the service.
4. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 116
FIGURE 4: ITIL V3 Service Lifecycle [7]
The five stages of the lifecycle are shown in figure 5 contain about twenty processes.
5. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 117
FIGURE 5: ITIL V3 Service Lifecycle Processes [8]
3. RELATED WORK
As stated on the ITIL official website [9] there are thousands of organizations worldwide which have
adopted ITIL V3 like NASA, the UK National Health Service (NHS), HSBC bank, Disney, IBM,
Telefonica, HP and British telecom (BT). We have implemented the following methodology in three
companies in Egypt which are ASCOM, DP World and Nile.Com and we succeeded in raising the
process maturity levels in the PMF in them all for three processes which are:
Incident Management which “concentrates on restoring the service to users as quickly as
possible, in order to minimize business impact” [10].
Problem management which “involves: root-cause analysis to determine and resolve the
cause of incidents, proactive activities to detect and prevent future problems/incidents and a
Known Error sub-process to allow quicker diagnosis and resolution if further incidents do
occur.” [10]
Change Management which “ensures that changes are recorded and then evaluated,
authorized, prioritized, planned, tested, implemented, documented and reviewed in a
controlled manner.” [11]
6. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 118
3-1. ASCOM Company
The first company is ASCOM which is working in mining and has 350 employees served by an IT
department containing five members including the IT manager. He described ASCOM by saying
“ASCOM has an array of diversified services and activities and we are keen to offer them
professionally to our customers. Over the three decades of its life, ASCOM has specialized in
geological services, studying and evaluating raw materials quality, and presenting technical
support for quarries operation. ASCOM acquired an excellent reputation in the technical services
it presents to the mining sector. ASCOM’s market share of the raw materials necessary for
cement production exceeded 60% in Egypt.” ASCOM IT department serves more than one
company under ASEC which are ASCOM, NEBTA, ASCOM SYRIA, LAZREG, NMD Nubia,
ASCOM CCM, ASCOMA, ASCOM Ethiopia and ASCOM Emirates for mining which makes the IT
department a Share Service Unit Provider as shown in figure 2 above.
3.2 DP World
DP World Sokhna is located at the southern entrance of the Suez Canal, Egypt, 120 kilometers
from Cairo. The port, which also lies adjacent to the North West Suez Economic Zone (NWSEZ),
is a state-of-the-art maritime facility, seamlessly integrating cutting edge technology with the
latest management and security skills.
Situated directly on the busy East-West trade route, DP World Sokhna is perfectly placed for the
handling of maritime traffic into and out of Egypt and the wider region - and to other markets
around the globe. DP World Sokhna boasts four quays, each easily able to handle cargo flows of
up to several million tons. The IT Department only serves Al Sokhna port department and it is an
Internal Service Provider as shown in figure 1 above.
3.3 Nile.com
Nile.Com Company can be introduced by its profile intro which was written by its chairman Mr.
Ahmad S. Anwar. He says “We established Nile.Com SAE in 1999. Back then, Nile.Com
consisted of a small privately owned stock holding company operated by a few employees. Our
activities evolved around hardware and software systems sales as well as technical services
provision. However, we were aiming high by having a clear-cut strategic plan: to become one of
the top and most successful players in the ever changing and greatly challenging field of
communication and information technology.
10 years later, after having expanded and relocated twice, that plan has become a reality:
Nile.Com with a proven record of achievements was able to secure a high ranking within this
dynamic competitive market by creating and successfully building top notch specialized teams
who seek not only customers’ satisfaction but also meeting vendors’ objectives.
Now Nile.Com is considered one of the best ICT professional services providers in Egypt due to
their achievements and their customers’ feedback. The services Nile.Com provides to its
customers are:
1-Infrastructure Solutions
2-Security Solutions
3-Business Continuity Solutions
4-Virtualization Solutions
NileCom Company serves many customers in the market and this is why it is considered External
Service Provider as shown in figure 3 above.
4- ITSM IMPLEMENTATION METHODOLOGY BASED ON ITIL VER.3
FRAMEWORK
Although ITIL V3 contains best practices for any IT service, it does not cover how to implement
ITIL in any organization as it covers WHAT and does not cover HOW. This paper will cover a
7. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 119
methodology which covers the implementation for ITSM based on ITIL V3 by combining many
techniques and methodologies. The methodology consists of the following seven steps.
4.1 Define Current Processes and Needed Processes
It is well known that ITIL V3 has divided the IT lifecycle to five main stages which have about
twenty main processes which cover all the aspects of an IT Service that could be at any company
whether it is a small, medium or big company and they are shown in figure 5. Although these
twenty processes cover all the lifecycle of any IT Service, no one can assume that all these
processes must be found in every business.
Small business may include some of them while large and huge companies may include many if
not all of them. For example in a small company which has a very small IT department it will be
very difficult to find at all Service Catalog Management [12] which is a process responsible for
having and maintaining a catalog which has accurate and updated information about all the
current service provided by the service provider to its customers or Service Level Management
(SLM) [13] process which manages the levels of the services the customers get from the service
provider. While in a world class mobile operator which exists in many countries, each country will
have a separate Service Catalog and Level Management process. In this dedicated Service
Catalog there will be all the services provided to the people of this country. Maybe at the head
quarter there will be a central Service Catalog containing all the service packages in the many
dedicated Service catalogs in all the other countries including all their features and pricing. Also
for the SLM process there will different service levels in each country according to the level of
needs in the customers of this country while there will be some levels decided by the head
quarter to be followed by all the other countries.
We start our research by discovering the existing and needed processes. There will be three
types of processes which are: current processes, needed processes and unnecessary processes
as they are not required by the business or are bigger than the maturity of the IT department.
4.2 Documenting Current Processes
After we define the current and needed processes there must be documentation for every existing
process to know all about its activities and components. To define the process at this stage there
should be a clear methodology to be a standard for documenting any process found in IT
department. As mentioned in The ITSM Process Design Guide [14] process documentation
should include seven components which we consider a good start for documenting any process
in a small or medium company and they are:
• Policy - which controls the process and how it works. It includes also the targets of the
process which are approved and recommended by the top management.
• Narrative - which tells the story of the process by stating its goal and objectives and how
it works
• Roles and Responsibilities - which assign specific people to specific activities and it
can use the RACI model [15] which stands for Responsible who is responsible for doing,
Accountable who is managing, Consulted who should be consulted and Informed who is
informed about status and updates to clarify the authority organization
• Process Overview - which describes how the process starts working from the input to
the activities inside the process to the value which is the output of the process.
• Process Maps - which depicts the process in a drawing or diagram to make it easy to
understand its internal components and its external relations.
8. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 120
• Activities - which are the tasks to be done so that the process can be operational. All
these activities must be assigned to specific people.
• Vocabulary - which is the meaning of every word mentioned in the description of the
process to make it clear to everyone whether he or she is specialized in the process and
its technologies or not.
At the same time processes at big companies will need more details in the documentation. The
sample process documentation mentioned in the ITIL V3 core publication Service Design [16]
by The Stationery Office (TSO) will be enough as it includes a sophisticated structure and it
includes:
Process name, description and administration (documentation administration:
version, change control, author, etc.)
Vision and mission statements
Objectives
Scope and terms of reference
Process overview: Description and overview, Inputs, Procedures, Activities, Outputs,
Triggers, Tools and other deliverables and Communication
Roles and responsibilities: Operational responsibilities, Process owner, Process
members, Process users and Other roles
Associated documentation and references
Interfaces and dependencies to: Other SM processes, Other IT processes and
Business processes
Process measurements and metrics: reviews, assessments and audits
Deliverables and reports produced by the process: Frequency, Content and
Distribution
Glossary, acronyms and references.
We believe that in some cases some processes may need another more customized model for
documenting them. In the three companies we did not find any of these processes which may
need special customization at all.
4.3 Use ITIL PMF to Measure Current Processes
We must measure the current processes to decide if they need improvement or redesign. If they
are good they may need to be better to increase their effectiveness and efficiency to a higher
level which makes it hard for competitors to reach to. If they are poorly documented, un-followed
by the IT staff or un-sufficient for the ever changing needs and requirement of the customers, We
must radically redesign in a proper manner. At the same time there could be some cases in which
the business does not have processes at all and needs to start from the beginning.
9. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 121
FIGURE 6: ITIL V3 PMF [17]
There should be a framework which covers how to assess a process. We use ITIL Process
Maturity Framework (PMF) as shown in figure 6 in our assignments to measure process maturity
and to know from where to start the improvement plan. ITIL PMF divides the process maturity into
five distinctive levels which are Initial, Repeatable, Defined, Managed and Optimizing. The
existing processes in any company will be assessed by the ITIL PMF to know at which level each
process is living and what are the opportunities available to raise it to a higher level.
In the Initial level the change resistance to process development will be at the highest levels as
IT staff is not acquainted with process and process management. To develop processes found in
this stage there must be management commitment and resources allocated to the development
plan. Unfortunately many companies have many processes at this initial stage in Egypt as
process management is a new concept for them.
The second level is Repeatable where the IT department and the whole company start to gain
more care about processes and knowledge but they are just starting. Processes in this level may
need to be developed and may need to be radically redesigned totally to improve it. There are
many challenges at this level like deciding from where to start and having dedicated resources to
implement improvement. Change resistance at this level is not high as the whole company
accepts to be improved in many sides and one of them is the IT.
The third level is Defined where the processes start to be clear and their development are
accepted widely. The process at this level is more mature and can be developed more easily than
the first and second levels but change resistance still exists. Management is supporting the IT
processes powerfully and is expecting more order and organization to be seen clearly in the
performance of IT department.
The fourth level is Managed which is a high level as IT processes are managed clearly. This level
is not easy at all to be reached as it needs total agreement and approval from all IT staff and the
company management to achieve high compliance to quality management in this department and
its functions too. The maturity at this level needs to be always measured and maintained so that
the good efforts are not wasted and lost. At this level IT staff has to be continually improved and
trained to keep the level of the IT services. Also the company may have internal or external audits
and monitoring.
10. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 122
The fifth and highest level is Optimizing which is not easy at all to be reached and very hard to
keep. To have the processes in this level this means that the whole company believes in process
maturity importance and the greatness of the effects of the process maturity on the whole
business.
The PMF is not a new or strange framework as it has the same levels and their names of the
Capability Maturity Model Integration (CMMI) [18]. PMF and CMMI have five levels while at the
same time the ISO/IEC 15504 [19] has six levels but with different names. We preferred to use
the PMF as it will suit the ITIL implementation most instead of integrating any other maturity
model.
4.4 Improve Current, Develop New or Redesign Old Process
At this point any company could have one of four types of processes which are:
1- A needed process
2- A current process which needs to be improved
3- A current process which needs to be radically redesigned
4- A current process which is sufficient for business and does not need any improvement
At this point any Egyptian company starts to believe in the process management and its
importance so there will be many processes which will be needed and they will be designed from
scratch. The problem at the same time will not be in just convincing the IT staff of the new
processes and how they will improve the quality of the IT service, but it will be also in convincing
the client to deal with the process and its tools and applications. Although the client is a very
important stakeholder and the one who gets the most benefits, the client will not accept any
guidance in using the new processes easily. Many companies have some processes which may
be good and effective but need some improvement.
All the points mentioned above in Defining and Documenting Current Processes part will be
developed for each process with a sense of customization as every company has many
processes and each one of them has special characteristics and requirements. This is why every
process will need a sort of customization even to the default definition or documentation provided
by ITIL framework. The level of customization will depend on the nature of the company, the
services it provides and the customers and their level which will be captured through surveys,
questionnaires, needs assessment and meetings with the stakeholders.
This methodology deals with the first three types of processes mentioned above and the forth
only needs continual improvement to always satisfy its stakeholders’ needs. For the first type
which is which is a needed process the stakeholders will be defined and a meeting with them will
be arranged whether together or separately to decide what are the process goals and objectives,
inputs, outputs, needed resources and capabilities and its internal activities. After we collect all
this info it will be easy to draw a diagram showing the process and all its components. We
arrange a second meeting with all the stakeholders to show them the process diagram and if they
agree we move to the next step and if they disagree we start a discussion about what is missing
or is unnecessarily added. The next point will be starting documenting the process and all its
components and interfaces to be standardized and show this new documentation to all the
internal stakeholders to approve it and publish it internally to be available to all employees and
specially the IT ones. Then the roles and responsibilities will be arranged in a RACI model and all
its members will approve their roles to have a consensus about how to run the process and
improve it accordingly. The most important point is to define a quarterly meeting for discussing
the process and it efficiency and effectiveness and there will be an annual meeting to renew the
documentation of the process. Throughout this year in the lifetime of the process any change will
be controlled by the change management process.
11. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 123
For the second type which is a process which needs improvement there will be a meeting with all
its stakeholders to collect all their goals and objectives and then collecting all the information
available about it and all components to know where is the shortage. A gap analysis will be
developed to know where the process is now and where it should be and a plan will be developed
to narrow the gap or eliminate it if possible. The plan will be presented to the stakeholders in a
meeting to get their feedback and acceptance combined with funds and responsibilities controlled
by a top management commitment. The plan could have many solutions which may cover staff
training, using new tools and technologies, managing the process interfaces better, building a
RACI model for the process activities and many others. After the plan completes and succeeds
the process documentation will be prepared and get approved and the whole process will be
under the control of the change management process.
For the third type which is a process which needs to be radically redesigned there will be some
additional work to the activated done for type two above as needs assessment will be conducted
with all the stakeholders to define their needs clearly. The current process is refused from those
stakeholders and there should be reasons for this and we must collect all these reasons before
thinking in redesigning the process to have effective design. When the problems of the current
process are discovered and agreed upon from all its stakeholders one or more solution will be
presented to them and if they agree to develop one then the same steps we use in type two
above will be used to complete the redesign of the process.
Also the process can have some drawings to make it clear to all the stakeholders including the
client, the process owner, the service provider management, the technical staff including the
service desk, infrastructure and application teams too and even the supplier if it is possible. We
draw process map to make it easy for its stakeholders to understand it in a single glance instead
of reading too much. ITIL V3 framework has provided us with some process maps like the
Incident Management process map in figure 7 below which may be enough for the need of a
company or which may need customization for some companies like the Incident Management
process map in figure 8 below and at the same time there are some process maps which are not
covered by ITIL so we have to start from scratch to develop them.
The three types covered above will need two shared activities and the first one is delivering
awareness sessions to everyone inside the service provider and maybe the suppliers and
customers about ITIL and its processes and functions which are teams of people who are asked
to do specific work to achieve specific output. The second activity is giving the IT staff ITIL V3
training courses and examination to raise their level of knowledge and experience to manage the
new and redesigned processes effectively after we complete our development and deliver the
processes to them as there should be some staff development program in place as the staff
needs development and training to be able to manage or follow a process. In some cases the
existence of a software suite whether for the Service Desk or any other function will make the
development result appear soon if there is no problem in using it by the users or a change
resistance in using it from the beginning.
4.5 Define Strategy, Critical Success Factors (CSF) and Key Performance
Indicators (KPI) for Each Process.
While we are developing current processes or designing new processes we start documenting
the process as it is very important because having a process with no documentation is like having
no process at all. A process needs a defined strategy to control it and to make it clear why this
process must exist by mentioning its goal and objectives to make the need for it clear.
Each process has some or many success factors which control its quality. At the same time each
process must have at least one if not two or three CSFs and it is our role to discover them and
write them down. Although the client of a service may bear losing one or maybe two of the
success factors he will never accept the absence of only one CSF. This is why we document and
publish CSFs to all the employees of the service provider and specially the IT Staff.
12. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 124
KPIs are also important at this stage as they will help the process owner who is responsible for
the process success and service owner who manages the service and all its components to
measure the level of the process efficiency and effectiveness. We define the KPIs at the start of
designing the process so that the process owner can use them effectively to manage it as there is
a principle of Dr. Deming [20] in the ITIL which states that “If you cannot measure it, you cannot
manage it” [15] and this is why KPIs are used to decide the measurement systems and their
outputs.
After some time the KPIs, CSFs and process maps need to be changed and improved as the
service is changing all the time to cover its customer’s ever changing business needs and this is
why we write in each process documentation the date of checking the suitability of documentation
and the process to be followed in case a change is needed.
For example the selected Service Desk KPIs are:
• Number of Incidents
• % of Incidents answered within defined timeframe
• First-call Incident resolution rate
• Average number of calls / service request per Service Desk Agent
• % of escalated Incidents
• % of unresolved Incidents
• Number of Service Requests
• % of First line service request closure
• % of reopened service requests
• % of escalated service requests to other functions
13. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 125
FIGURE 7: ITIL V3 Incident Management default Process [21]
14. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 126
FIGURE 8: ITIL V3 Incident Management customized Process
4-6. Building Metrics to Measure Main Functions and Processes
The ITSM Process Design Guide [22] has a ten steps metric program which describes how to
create suitable metrics in an easy way without any complication or buying any expensive
software. We are using this technique for three years now and it is a very successful one. At the
beginning of the implementation the first four or five steps will be easy to be accomplished and
the others can be developed in the later stages as they are more advanced than the first ones.
These simple ten steps we have arranged them in a flow chart and they are shown in figure 9
below:
15. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 127
FIGURE 9: ITIL V3 Incident Management customized Process
16. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 128
After applying these simple ten steps the company can have suitable metrics which can measure
the efficiency and effectiveness of any process or function to be able to manage them.
4.7 Use ITIL PMF After the Implementation to Measure Improvement in
Processes
When the design, redesign, development, documentation, drawing of process, stakeholder
awareness about ITIL and IT staff training on ITIL are completed there must be some kind of
improvement. There could be no improvement and this could be due to a wrong theory or to
wrong implementation. To measure this improvement we use the ITIL PMF again to calculate the
difference between the process before the implementation of this development methodology and
after it.
Not all the processes will have significant improvement after the first try, and this is why continual
improvement is required. At the same time while the maturity of a process increases the maturity
and experience of the process owner increases too. Not only the service and process owners will
feel the improvement of a process but also the client and in some cases the supplier as well. The
ITIL PMF will be used to guide the decision makers to decide if the time, resources and money
spent were enough or not and if there is any Return On Investment or not.
5 EXPERIMENTAL RESULTS AND PERFORMANCE EVALUATION
This methodology has been used in three companies in Egypt which are ASCOM, Nile.Com and
DP World for the incident, problem and change management processes and it succeeded very
much with the three and the levels of PMF before and after the implementation prove its success
as shown in the next table:
Participating
Company
Process PMF Level Before
Implementation
PMF Level After
Implementation
ASCOM Incident
Management
First Level Initial Forth Level Managed
Problem
Management
First Level Initial Forth Level Managed
Change
Management
First Level Initial Forth Level Managed
DP World Incident
Management
Combined processes
first Level Initial
Third Level Defined
Problem
Management
Third Level Defined
Change
Management
First Level Initial Third Level Defined
Nile.Com Incident
Management
Combined processes
first Level Initial
Forth Level Managed
Problem
Management
Third Level Defined
Change
Management
NA Third Level Defined
TABLE 1: The PMF levels before and after implementing the methodology.
Now the three companies have documented processes which are used to manage their IT
services and are baselined with RACI model to define authorities. Whenever any change is
needed to the process or its documentation the change management process will control it to
have stable environment. All the processes now have diagrams, CSFs, KPIs, SLAs, OLAs and
review meetings to control their efficiency and effectiveness.
17. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 129
The three companies have decided to use a software solution for ITSM and there were many
comparisons among many vendors and their software. While there are big vendors like IBM, HP
and Microsoft there were many other small vendors with simple and cheap solutions. The three
companies have chosen to user tools from other vendors as ASCOM and DP World have decided
to use Service Desk Plus by Manage Engine and Nile.Com has chosen System Center Service
Manager by Microsoft.
Participating
Company
Chosen Software Tool Software Tool Vendor Implementation
ASCOM Service Desk Plus 8.0 Manage Engine Implemented
DP World Service Desk Plus 8.0 Manage Engine To be implemented next year
Nile.Com SCSM 2010 Microsoft To be implemented next year
TABLE 2: The participating companies’ chosen software tool, vendors and implementation
status.
The three participating companies tried to develop and use both Service Level Agreements (SLA)
which is described by the OGC as “An SLA is a written agreement between an IT service provider
and the IT customer(s), defining the key service targets and responsibilities of both parties.”[23]
and Operational Level Agreement (OLA) which is defined by the OGC as “An OLA is an
agreement between an IT service provider and another part of the same organization that assists
with the provision of services”[2 3] to control relations with customers and internal technical
functions but not all of them could achieve this target. The next table will compare between the
three participating companies:
Item ASCOM DP World Nile.Com
SLA Implemented Implemented Implemented
OLA Implemented Will be implemented in
the 3rd
Quarter
Will be implemented in
the 3rd
Quarter
TABLE 3: SLA and OLA implementation status.
ASCOM Service Desk KPIs in just six months after implementing the methodology are:
• Number of Incidents 2780
• 90 % of Incidents answered within defined timeframe
• 99 % First-call Incident resolution rate
• Average number of calls / service request per Service Desk Agent 659 (4 Agents)
• 1 % of escalated Incidents
• 0 % of unresolved Incidents
• 90 % of First line service request closure
• 1 % of reopened service requests
• 1 % of escalated service requests to other functions
ASCOM IT manager considers these KPIs a great improvement as ASCOM did have any
process documentation, RACI model, KPIs or CSFs before six months. The other two
companies are waiting for the new budget to but the selected software and to complete the
Service Desk part in the ITSM implementation project.
18. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 130
The three companies now have better process to manage their IT services and have better
customer satisfaction. Now they are thinking in implementing the other ITIL processes in the
near future to have the best practices in IT service management in preparation for ISO/IEC
20000 certification.
6 COMPARATIVE EVALUATION
One of the best sources of process development theories is the book The ITSM Process Design
Guide [24] by Donna Knapp which has ten chapters covering all the topics of process developing,
reengineering and improving following an introduction to quality management principles. This
book is very good for the use of reference for those who are interested in learning how a process
design engineer but it does not give any scenario or case study from real world with a comparison
of the as-is and to-be states as this methodology does for three companies with different types
and size.
Also it has described many techniques for defining and analyzing customer requirements,
process design and improvement tools and IT Service Management Technologies which qualifies
it to be a reference instead of a simple to follow methodology.
• It has ten steps for process design and improvement and they are:
• Determine managements vision and level of commitment
• Establish a project and form a project team
• Define the process and identify customer requirements
• Document the “As Is” process and baseline current performance
• Assess conformance to customer requirements
• Benchmark current performance
• Design or redesign process
• Solicit feedback, fine-tune and finalize the design
• Implement the new process
• Assess performance and continually improve.
In these ten steps the writer did not use PMF to measure the process before and after process
development as our methodology does and she used the conformance to the customer
requirements before the development and the performance after it although she has mentioned
the PMF before as a measurement techniques.
Knapp has paid attention to awareness and training as we did but there is a big difference
between the needs of the companies in USA and those in Egypt and other Arab countries as in
USA ITIL and other frameworks are known and used for many years now and many companies
have ISO/IEC 20000 certification while in Egypt and other Arab countries ITIL is a new framework
and there is a few number of companies or individuals who know It or are able to implement it in
an environment which fight change by all the strengths it has.
7 CONCLUSION
Although ITIL V3 is considered the best public framework which includes the best practices in the
IT field, it provides its readers with only the theory and not the implementation methodology. This
is why we tried to create a methodology based on many fields like System Analysis and Design,
Project Management, Advanced Software Engineering and Process Design Engineering and this
is one of the reasons of the success of this methodology. This methodology succeeded three
times in the three companies mentioned above and it can be developed more and more
according to the needs of the company which needs the development.
19. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 131
8 FUTURE WORK
In the future we will try to develop a software for Service Desk including many ITIL V3 processes
using a web portal like Microsoft SharePoint portal [25] which combines many features and can
be customized too and publish it on a public cloud [26] by using the infrastructure of the public
cloud provider as an Infrastructure as a Service (IAAS) [27] and offer it to many companies in a
pay-as-you-go model and as a Software as a Service (SAAS) [28] to reduce the cost of
implementing ITSM using many software solutions with very high costs and having many IT staff
to run and manage them.
9 REFERENCES
[1] ISO/IEC 20000 certified companies,
http://www.isoiec20000certification.com/home/ISOCertifiedOrganizations/ISOCountryListin
gs.aspx 2012
[2] Office of Government Commerce, Service Design, UK, TSO, 2007, pp. 263.
[3] Office of Government Commerce, The Official Introduction to the ITIL Service Lifecycle,
UK, TSO, 2007, pp. 151.
[4] Office of Government Commerce, The Official Introduction to the ITIL Service Lifecycle,
UK, TSO, 2007, pp. 152.
[5] Office of Government Commerce, The Official Introduction to the ITIL Service Lifecycle,
UK, TSO, 2007, pp. 153.
[6] Office of Government Commerce, The Official Introduction to the ITIL Service Lifecycle,
UK, TSO, 2007, pp. 17.
[7] Office of Government Commerce, The Official Introduction to the ITIL Service Lifecycle,
UK, TSO, 2007, pp. 11.
[8] Office of Government Commerce, The Official Introduction to the ITIL Service Lifecycle,
UK, TSO, 2007, pp. 150.
[9] http://www.itil-officialsite.com/AboutITIL/WhatisITIL.aspx
[10] Office of Government Commerce, Service Operation, UK, TSO, 2007, pp. 35.
[11] Office of Government Commerce, Service Transition, UK, TSO, 2007, pp. 43.
[12] Office of Government Commerce, Service Strategy, UK, TSO, 2007, pp. 75.
[13] Office of Government Commerce, Service Design, UK, TSO, 2007, pp. 65.
[14] Donna Knapp, The ITSM Process Design Guide, J. Ross Publishing, USA, 2010, pp. 49.
[15] Office of Government Commerce, Service Strategy, UK, TSO, 2007, pp. 259.
[16] Office of Government Commerce, Service Design, UK, TSO, 2007, pp. 237.
[17] Office of Government Commerce, Service Design, UK, TSO, 2007, pp. 263.
[18] http://www.sei.cmu.edu/cmmi/
[19] http://en.wikipedia.org/wiki/ISO/IEC_15504
20. Mostafa Mohamed AlShamy, Essam Elfakharany & Mostafa Abd ElAziem
International Journal of Business Research and Management (IJBRM), Volume (3): Issue (3): 2012 132
[20] http://en.wikipedia.org/wiki/Dr._deming
[21] Office of Government Commerce, Service Operation, UK, TSO, 2007, pp. 48.
[22] Donna Knapp, The ITSM Process Design Guide, J. Ross Publishing, USA, 2010, pp. 121.
[23] Office of Government Commerce, Service Design, UK, TSO, 2007, pp. 66.
[24] http://www.itsmacademy.com/Detail.bok?no=131
[25] http://sharepoint.microsoft.com/en-us/Pages/default.aspx
[26] http://en.wikipedia.org/wiki/Introduction_to_cloud_computing#Public_cloud
[27] http://en.wikipedia.org/wiki/Infrastructure_as_a_Service#Infrastructure
[28] http://en.wikipedia.org/wiki/Software_as_a_Service