Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540078
A. Beal, D. Mossé
For a B2C enterprise, resource management plays a crucial role in the achievement of business objectives. When a Web server becomes busy, and there is no control over which user requests to attend to first, negative business outcomes may result, such as a customer in the final steps of making a purchase being kept waiting and deciding to abandon the site for lack of a timely response, while less critical or urgent requests are being handled. On the other hand, if the relative value of executing different types of user requests is known, resource management mechanisms can be used to optimize the allocation of the sparsely available resources. In this paper, we introduce a methodology for estimating the value of end-user requests on a business-to-consumer (B2C) environment based on business strategy. The proposed value-estimating methodology can be used as a base for improving the allocation of e-commerce resources during peak traffic situations by maximizing the aspects of the service with more return to offer in terms of the achievement of business goals and objectives.
{"title":"From e-business strategy to IT resource management: A strategy-centric approach to timely scheduling web requests in B2C environments","authors":"A. Beal, D. Mossé","doi":"10.1109/BDIM.2008.4540078","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540078","url":null,"abstract":"For a B2C enterprise, resource management plays a crucial role in the achievement of business objectives. When a Web server becomes busy, and there is no control over which user requests to attend to first, negative business outcomes may result, such as a customer in the final steps of making a purchase being kept waiting and deciding to abandon the site for lack of a timely response, while less critical or urgent requests are being handled. On the other hand, if the relative value of executing different types of user requests is known, resource management mechanisms can be used to optimize the allocation of the sparsely available resources. In this paper, we introduce a methodology for estimating the value of end-user requests on a business-to-consumer (B2C) environment based on business strategy. The proposed value-estimating methodology can be used as a base for improving the allocation of e-commerce resources during peak traffic situations by maximizing the aspects of the service with more return to offer in terms of the achievement of business goals and objectives.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540085
Zhe Yang, Saltant Khamit, A. Mohammed, Peter Larson
In this paper, we will explore the existing operational "business models" for municipal wireless networks in US and Sweden. Based on the current paradigms of the North-American public wireless networks, we will investigate an emerging wireless city concept in Sweden to analysis this new business concept in the existing field. We will look into the relationship of different actors in various business models of the wireless cities in our selected case studies. This paper will aim to demonstrate a number of key considerations when designing and managing the business model of Municipal wireless networks as business-driven and public utility-driven services.
{"title":"A comparative study on business models of municipal wireless cities in US and Sweden","authors":"Zhe Yang, Saltant Khamit, A. Mohammed, Peter Larson","doi":"10.1109/BDIM.2008.4540085","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540085","url":null,"abstract":"In this paper, we will explore the existing operational \"business models\" for municipal wireless networks in US and Sweden. Based on the current paradigms of the North-American public wireless networks, we will investigate an emerging wireless city concept in Sweden to analysis this new business concept in the existing field. We will look into the relationship of different actors in various business models of the wireless cities in our selected case studies. This paper will aim to demonstrate a number of key considerations when designing and managing the business model of Municipal wireless networks as business-driven and public utility-driven services.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115525463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540069
C. Ralha, Rafael Gostinski
Organizations are characterized by the usage of multiple applications and heterogeneous technological environments. Although business and IT processes are defined quite good, the processes themselves are quite different and locked in the specific application areas. As a result the language of those areas are also specific what helps to maintain the distance of the processes and make hard the mutual understanding between business and IT units. Conscious that the frequent interaction among business and IT units in any organization turned out to be the single most important factor of IT usage, this article presents a methodological framework for business-IT alignment, based on process modeling and ontology theory. The aim of the proposed methodological framework is to combine different domain ontologies - specifically business and IT, with organization processes, to achieve better organization productivity through the use of a common language.
{"title":"A methodological framework for business-IT alignment","authors":"C. Ralha, Rafael Gostinski","doi":"10.1109/BDIM.2008.4540069","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540069","url":null,"abstract":"Organizations are characterized by the usage of multiple applications and heterogeneous technological environments. Although business and IT processes are defined quite good, the processes themselves are quite different and locked in the specific application areas. As a result the language of those areas are also specific what helps to maintain the distance of the processes and make hard the mutual understanding between business and IT units. Conscious that the frequent interaction among business and IT units in any organization turned out to be the single most important factor of IT usage, this article presents a methodological framework for business-IT alignment, based on process modeling and ontology theory. The aim of the proposed methodological framework is to combine different domain ontologies - specifically business and IT, with organization processes, to achieve better organization productivity through the use of a common language.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540082
A. Caracas, A. Kind, D. Gantenbein, Stefan Fussenegger, Dimitrios Dechouniotis
Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in support of a business-driven IT management. In general, the results of a dependency analysis can be used for infrastructure reengineering, show evidence of policy and process compliance, and support assessments of business resilience. Current passive discovery approaches using network monitoring analyze only direct communication between assets and provide just a single- link mesh view. This work introduces a new algorithm based on NetFlow data preprocessed by the Aurora system developed at IBM Research to create a dependency model of the network. The algorithm uses time-based event correlation and the data mining concept of association rules to detect and classify dependencies that span two or more components. The advantages of the algorithm is that no access credentials are required and no packet payload inspection is performed. The suggested algorithm populates and maintains a dependency model of an observed network that describes dependencies among computer systems, software components, and services. The model combines the mined association rules that express relations between flows into dependencies, which are given intuitive semantics. Tests with simulated and authentic data prove the accuracy of the dependency mining algorithm.
{"title":"Mining semantic relations using NetFlow","authors":"A. Caracas, A. Kind, D. Gantenbein, Stefan Fussenegger, Dimitrios Dechouniotis","doi":"10.1109/BDIM.2008.4540082","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540082","url":null,"abstract":"Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in support of a business-driven IT management. In general, the results of a dependency analysis can be used for infrastructure reengineering, show evidence of policy and process compliance, and support assessments of business resilience. Current passive discovery approaches using network monitoring analyze only direct communication between assets and provide just a single- link mesh view. This work introduces a new algorithm based on NetFlow data preprocessed by the Aurora system developed at IBM Research to create a dependency model of the network. The algorithm uses time-based event correlation and the data mining concept of association rules to detect and classify dependencies that span two or more components. The advantages of the algorithm is that no access credentials are required and no packet payload inspection is performed. The suggested algorithm populates and maintains a dependency model of an observed network that describes dependencies among computer systems, software components, and services. The model combines the mined association rules that express relations between flows into dependencies, which are given intuitive semantics. Tests with simulated and authentic data prove the accuracy of the dependency mining algorithm.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540071
Stewart H. C. Wan, Y. Chan
For any fault of the same severity level, traditional fault discovery and notification tools provide equal weighting from business points of view. To improve the fault correlation from business perspectives, we proposed a framework to automate network and system alerts with respect to its business service impact for proactive notification to IT operations management. This paper outlines the value of business continuity planning (BCP) during the course of service impact analysis, placing particular emphasis on the business perspective in the processes of IT service management. The framework explicitly employs BCP relevant processes in order to identify the relationships between business services and IT resources A practical case in IT operations to illustrate the concept was then conducted.
{"title":"Adoption of business continuity planning processes in IT service management","authors":"Stewart H. C. Wan, Y. Chan","doi":"10.1109/BDIM.2008.4540071","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540071","url":null,"abstract":"For any fault of the same severity level, traditional fault discovery and notification tools provide equal weighting from business points of view. To improve the fault correlation from business perspectives, we proposed a framework to automate network and system alerts with respect to its business service impact for proactive notification to IT operations management. This paper outlines the value of business continuity planning (BCP) during the course of service impact analysis, placing particular emphasis on the business perspective in the processes of IT service management. The framework explicitly employs BCP relevant processes in order to identify the relationships between business services and IT resources A practical case in IT operations to illustrate the concept was then conducted.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540077
G. Grabarnik, Heiko Ludwig, L. Shwartz
IT service providers typically must comply with service level agreements that are part of their usage contracts with customers. Not only IT infrastructure is subject to service level guarantees such as availability or response time but also service management processes as defined by the IT Infrastructure Library (ITIL) such as change and incident processes and the fulfillment of service requests. SLAs relating to service management processes typically address metrics such as initial response time and fulfillment time. Large service providers have the choice of which internal service delivery team or external service provider they assign to parts of a service process, each provider having different costs or prices associated with it for different turn-around times at different risk. This choice in QoS and cost of different service providers can be used to manage the trade-off between penalty costs and fulfillment cost. This paper proposes a model as a basis for service provider choice at process runtime, taking into account the progress of a process so far and the availability of service capacity at service suppliers. This model can be used to reduce total service costs of IT service providers deciding on alternative delivery teams and external service providers when needed and based on current process performance.
{"title":"Dynamic management of outsourced service processes’ QoS in a service provider - service supplier environment","authors":"G. Grabarnik, Heiko Ludwig, L. Shwartz","doi":"10.1109/BDIM.2008.4540077","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540077","url":null,"abstract":"IT service providers typically must comply with service level agreements that are part of their usage contracts with customers. Not only IT infrastructure is subject to service level guarantees such as availability or response time but also service management processes as defined by the IT Infrastructure Library (ITIL) such as change and incident processes and the fulfillment of service requests. SLAs relating to service management processes typically address metrics such as initial response time and fulfillment time. Large service providers have the choice of which internal service delivery team or external service provider they assign to parts of a service process, each provider having different costs or prices associated with it for different turn-around times at different risk. This choice in QoS and cost of different service providers can be used to manage the trade-off between penalty costs and fulfillment cost. This paper proposes a model as a basis for service provider choice at process runtime, taking into account the progress of a process so far and the availability of service capacity at service suppliers. This model can be used to reduce total service costs of IT service providers deciding on alternative delivery teams and external service providers when needed and based on current process performance.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-04-07DOI: 10.1109/BDIM.2008.4540076
T. Schaaf, M. Brenner
Service level management (SLM) is a vital discipline in customer-oriented IT service management. Covering technical as well as organizational and economic aspects, this multi-dimensional management area has become even more important against the background of the business-driven IT management (BDIM) paradigm. Today, tools and management solutions available for SLM face three major challenges: First, the lack of an established platform-independent model (PIM) for SLM entails the existence of hard- to-integrate "islands" of support tools and makes an integrated approach to SLM tool support all but impossible. Secondly, the current solutions are mostly focused on SLA-speciflc issues, neglecting significant SLM responsibilities such as the deployment of service catalogs. Lastly, the limited perspective of many existing SLM solutions disregards the important links between SLM-related management tasks and those of other management disciplines such as fault or performance management. This paper presents first results of ongoing research aiming at developing a practicable, integrated solution for SLM, addressing above mentioned challenges. To this end, essential requirements are pointed out, and four common modules of a management architecture for SLM are outlined.
{"title":"On tool support for Service Level Management: From requirements to system specifications","authors":"T. Schaaf, M. Brenner","doi":"10.1109/BDIM.2008.4540076","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540076","url":null,"abstract":"Service level management (SLM) is a vital discipline in customer-oriented IT service management. Covering technical as well as organizational and economic aspects, this multi-dimensional management area has become even more important against the background of the business-driven IT management (BDIM) paradigm. Today, tools and management solutions available for SLM face three major challenges: First, the lack of an established platform-independent model (PIM) for SLM entails the existence of hard- to-integrate \"islands\" of support tools and makes an integrated approach to SLM tool support all but impossible. Secondly, the current solutions are mostly focused on SLA-speciflc issues, neglecting significant SLM responsibilities such as the deployment of service catalogs. Lastly, the limited perspective of many existing SLM solutions disregards the important links between SLM-related management tasks and those of other management disciplines such as fault or performance management. This paper presents first results of ongoing research aiming at developing a practicable, integrated solution for SLM, addressing above mentioned challenges. To this end, essential requirements are pointed out, and four common modules of a management architecture for SLM are outlined.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-01-25DOI: 10.1109/BDIM.2008.4540072
Ayse Morali, E. Zambon, S. Etalle, Paul L. O. Re
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The approach is based on a model integrating information assets and the IT infrastructure that they rely on for distributed systems. IT infrastructures enable one to analyse risk propagation possibilities and calculate the impact of confidentiality incidents. Furthermore, our approach is a mean to bridge the technical and business- oriented views of information systems, since the importance of information assets, which is leading the technical decisions, is set by the business.
{"title":"IT confidentiality risk assessment for an architecture-based approach","authors":"Ayse Morali, E. Zambon, S. Etalle, Paul L. O. Re","doi":"10.1109/BDIM.2008.4540072","DOIUrl":"https://doi.org/10.1109/BDIM.2008.4540072","url":null,"abstract":"Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic assessment and analysis of confidentiality risks caused by disclosure of operational and functional information. The approach is based on a model integrating information assets and the IT infrastructure that they rely on for distributed systems. IT infrastructures enable one to analyse risk propagation possibilities and calculate the impact of confidentiality incidents. Furthermore, our approach is a mean to bridge the technical and business- oriented views of information systems, since the importance of information assets, which is leading the technical decisions, is set by the business.","PeriodicalId":426943,"journal":{"name":"2008 3rd IEEE/IFIP International Workshop on Business-driven IT Management","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}